Exam Name: Exam Type: Exam Code

:

Linux+ CompTIA XK0-002

Total Questions:

736

Question: 1 On an NIS client, the following is a portion of the output of cat /etc/passwd: +Joe:::::::: +Sam:::::::: +:*::::::::/bin/false Which of the following is true for all users other than Joe and Sam? A. They have full access. B. They are denied access. C. They are granted limited access. D. They gain access after being prompted for a shell. Answer: B Question: 2 How can a user view an X Window from a remote system on their local system? A. from the local system: export DISPLAY=local:0.0 B. from the remote system: export DISPLAY=local:0.0 C. from the local system: export DISPLAY=remote:0.0 D. from the remote system: export DISPLAY=remote:0.0 Answer: B Question: 3 Which of the following commands can be used to confirm that the FTP server is listening? A. netstat -a ftp B. netstat | grep ftp C. netstat -u | grep ftp D. netstat -a | grep ftp Answer: D Explanation: -a Display all connections and listening ports Question: 4 When a RAID 5 array is configured with a hot-spare disk under Linux, which of the following is the minimum number of drives required? A. 2 B. 3 C. 4 D. 5 Answer: C
Page 1 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

Explanation: Raid 5 requires 3 disks. Hotspare 1. Question: 5 A system administrator wants to see if an RPM package is installed on a user workstation. Which of the following commands should be used? A. rpm -query <filename> B. rpmfind <name of package> C. rpm -qa | grep <name of package> D. find -name rpm | grep <filename> Answer: C Explanation: -q query, -a lists all installed packages Question: 6 Which of the following can be used to determine who has scheduled a job? A. who B. whodo C. at -d D. at -l Answer: D Question: 7 Which of the following encryption schemes is the LEAST secure? A. DES B. MD5 C. AES D. Blowfish Answer: A Explanation: The Data Encryption Standard, a block cipher with 64-bit blocks and a 56-bit key Like MD4, it produces a 128-bit hash. For details see RFC 1321 AES ciphers use a 128-bit block and 128, 192 or 256-bit keys A block cipher using 64-bit blocks and keys of up to 448 bits Question: 8 A Linux machine has a local address of 192.168.1.1 with subnet mask of 255.255.255.0. All services are currently denied. Which of the following lines should be appended to hosts.allow file to permit access to the Web service on the local subnet. A. httpd: 192.168.1.0/24 B. ALL: 192.168.1.255/24 C. ALL except httpd: 192.168.1.1/24 D. 192.168.1.255/255.255.255.0:httpd Answer: A
Page 2 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

Explanation: To permit access to the Web service, you need to permit access to the HTTP daemon (httpd). You then need to specify which IP addresses can access it. 192.168.1.0 is the network address of a host with an IP address of 192.168.1.1. The statement 'httpd: 192.168.1.' (without the 0) will allow all machines in the 192.168.1.0 subnet access to the Web service. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 364. Incorrect Answers: B. The ALL statement is invalid. It can only be used in the client list to mean 'all' IP addresses. C. The ALL statement is invalid. It can only be used in the client list to mean 'all' IP addresses. D. The server service come before the client list. Question: 9 A Linux administrator is about to install a Linux server. The server has 256MB of RAM. Which of the following sizes of the swap partition is generally recommended? A. 128MB B. 256MB C. 512MB D. 1024MB Answer: C Explanation: swap partitions are used to support virtual memory. In other words, data is written to a swap partition when there is not enough RAM to store the data your system is processing. If you are unsure about what size swap partition to create, make it twice the amount of RAM on your machine (but no larger than 2 GB). It must be of type swap. Question: 10 Which driver, if any, is required to support L3 cache on the system processor? A. msr.o B. mtrr.o C. cache.o D. No driver is required. Answer: D Question: 11 A user wants to remotely connect to a Linux system to transfer files from an oversea IP address. Which of the following programs allows the user to do this securely? A. rcp B. ftp C. sftp D. Telnet Answer: C Explanation: sftp = secure ftp
Page 3 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

Question: 12 When the command mke2fs -j is run, what type of system is created? A. ext2 B. ext3 C. jfs D. xfs Answer: B Explanation: Simply run mke2fs -j /dev/hdXX to create a new ext3 filesystem on that device. Question: 13 In addition to selected packages and partition maps, which of the following should also be documented during a Linux server installation? A. System hardware and user passwords B. Root password and performance baseline C. Daemon configuration and performance baseline D. System hardware and daemon configuration Answer: D Question: 14 Which of the following commands can be run to determine which package owns /etc/exports? A. rpm -qf /etc/exports B. rpm -ql /etc/exports C. rpm --file /etc/exports D. rpm --verify /etc/exports Answer: A Explanation: -q = query, -f = Lists the package that owns the specified file. Question: 15 The rot user types 'echo $PATH' and sees the following output: .:/bin:/usr/bin:/sbin:/usr/X11R6/bin:/usr/src Which of the following parts of this path is considered to be a security risk? A. . B. /sbin C. /usr/src D. /usr/X11R6/bin Answer: A Explanation: A common mistake in the past (?) was to keep '.' in the root's path. Malicious hacker makes program 'ls' in his home directory. If root makes
Page 4 of 217

smbmount //servername/sharename /mountdirectory -o username=mywindowsusername. C. D. Samba also provides smbmount. password=mywindowspassword smbmount -t smbfs //servername/sharename /mountdirectory -o username=mywindowsusername. Run chkdsk on the .iso D. where package_name is the name of the package you downloaded: shell> md5sum package_name Question: 18 What is the result of the following command? Sendmail -qp5m A. password=mywindowspassword mount -t samba /servername/sharename /mountdirectory -o username=mywindowsusername. Processes mail in blocks of five messages B. Verify the checksum match for the . B. Limits queue to five messages D. which of the following is the next step? A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 # cd ~hacker # ls he executes ls command of hacker's. and has a syntax similar to the tradition Linux mount command: smbmount //server/service /mountpoint Question: 17 Once a Linux Installation Disk image has been downloaded. Question: 19 Page 5 of 217 . Question: 16 Which of the following commands can be used to mount a Samba share? A. password=mywindowspassword mount -t smbf \\servername\sharename /mountdirectory -o username=mywindowsusername. Run /sbin/verify_iso B. Quits and restarts sendmail every five minutes C. As it's name implies smbmount is used to mount filesystems being shared using SMB.iso system image C. password=mywindowspassword Answer: A Explanation: To solve this problem. Processes mail every five minutes Answer: D Explanation: -q[time] process saved messages in the queue at given intervals. Check the file size to ensure the file is uncorrupted Answer: C Explanation: Each package has an individual checksum that you can verify with the following command. 5m = every 5 minutes.

Linux extended Answer: D Page 6 of 217 .255. which will force a route lookup to fail.conf Answer: B Explanation: The lpd system is configured via /etc/printcap. /etc/printers/default.0 netmask 255.100.255.0 netmask 255. This is NOT for firewalling.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A Linux technician would like to change the default lpr queue to print to a new printer.100. which kind of partition will be created? A.168. This is for example used to mask out networks before using the default route.100. /etc/vprint B. Swap B. route del -net 192. Hard drive B.conf D. to check if the physical connection between your computer and the printer is working Question: 20 Which of the following commands can be used to configure a router to reject the address for the 192.255.0/24 network using the route command? A. /etc/printcap C. Question: 21 A company wants to install a Linux server to act as an internal file and print server.0 deny C.168.100. Processor C.100.255.0 reject Answer: D Explanation: route [-v] [-A family] add [-net|-host] target [netmask Nm] [gw Gw] [metric N] [mss M] [window W] [irtt I] [reject] [mod] [dyn] [reinstate] [[dev] If] reject install a blocking route.0 deny B. Which file should be edited to make this change? A. Which of the following is the MOST important hardware investment for this user? A. /etc/lpd. route add -net 192. Linux native D.255. IEEE-1394 card Answer: A Question: 22 When using fdisk and a partition type of 85 is selected.255. route add -net 192.0 netmask 255. route del -net 192. Before configuring /etc/printcap it is a good idea to make a printer test.0 netmask 255.168. Video card D. Reiserfs C. They have a limited budget.255.168.255.0 reject D.168.

11b. L B. Which of the following commands will retrieve the full documentation for the ls command? A. Text ls D. Tail 15 filename B. wlancfg C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: 82 Linux Swap 83 Linux native 85 Linux extended Question: 23 The man page for the 'ls' command states: The full documentation for ls is maintained as a Texinfo manual. It is primarily designed for writing software manuals. Man -info ls Answer: A Explanation: Texinfo is a documentation system that uses a single source file to produce both online information and printed output. For a full description of the Texinfo language and associated tools. which of the following interactive commands in 'top' will display the process with highest memory usage? A. netconfig Answer: B Question: 25 When the application 'top' is used. Cat filename | more 15 Page 7 of 217 . M Answer: C Question: 26 Which of the following commands will display the last 15 lines of an application log? A. Grep -l 15 | cat D. WINE B. Infoman ls C. Which of the following applications would allow the user to configure the WEP (Wired Equivalent Privacy) key? A. Info ls B. Cat filename | less 15 C. please see the Texinfo manual (written in Texinfo itself). Most likely. wl-keygen D. running this command from your shell: info texinfo Question: 24 A user needs to attach a Linux laptop to a wireless access point using 802. I C. R D.

iptables -n -L C. Cat /var/log/wtmp D. --list List all rules in the selected chain. iptables natadd D. If no chain is selected. Useradd -u bsmith -c 555-1234 D. Cat /var/log/btmp Answer: A Explanation: Lastb is the same as last. in which case the chain(s) will be atomically listed and zeroed. instead of the last 10 Question: 27 Which of the following commands will allow a system administrator to determine which user have attempted to logon but failed? A. network names. The output of ls -l b is: Page 8 of 217 . -n. Question: 29 Which of the following commands allows an administrator to add an existing user's phone number to the system as a comment? A.. except that by default it shows a log of the file /var/log/btmp. Question: 28 Which of the following commands is used to check the current iptables configuration? A.. --numeric Numeric output. all chains are listed.. iptables -LFZ B. Lastb B. or services (whenever applicable)..Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: A Explanation: tail [OPTION]. Modinfo -u bsmith 555-1234 C. Last C. Groupadd -u bsmith -c 555-1234 Answer: A Explanation: usermod [-c comment] [-d home_dir [-m]] Question: 30 Suppose b is a link to another file. -L. Usermod -c 555-1234 bsmith B. which contains all the bad login attempts. the program will try to display them as host names. The exact output is effected by the other arguments given. [FILE]. --lines=N output the last N lines. It is legal to specify the -Z (zero) option as well. By default. iptables -A -D -C Answer: B Explanation: -n. IP addresses and port numbers will be printed in numeric format.

cat /proc/cpuinfo | grep CPU C.10.1? A. Permissions listed for oth the symbolic link and the target file are changed. However. find /var/log/dmesg | grep CPU D.1 Answer: B Explanation: -c blowfish|3des|des Selects the cipher to use for encrypting the session.10. dmesg | grep CPU B. C.1 C. Question: 33 Which of the following daemons could be used for printing on a Linux system? A.10. chmod ignores symbolic links encountered during recursive directory traversals Question: 31 Which of the following commands can be used to gather information about the CPU found during boot? A. Answer: C Explanation: chmodnever changes the permissions of symbolic links. ssh -alg=3des 10. Permissions for the target file are set to 600 while permissions listed for the link are unchanged. ssh -c 3des 10. ssh -crypto=3des 10.10.1 D. The user will receive an error message. cupsd Page 9 of 217 .10. Permissions associated with the symbolic link itself are set to 600 while permissions for the target file are unchanged. The program helps users to print out their bootup messages.10.10. In contrast. Question: 32 Which of the following is the correct way to specify the algorithm for an SSH (Secure Shell) connection to 10. cat /var/log/messages | grep CPU Answer: A Explanation: dmesg is used to examine or control the kernel ring buffer.1 B. sane C. ssh -a 3des 10.10. for each symbolic link listed on the command line.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 lrwxrwxrwx 1 root root 1 Jun 13 12:44 b -> a Which of the following is the effect if root issues the command 'chmod 600 b' A. lprd B.10. This is not a problem since the permissions of symbolic links are never used. D. B. chmod changes the permissions of the pointed-to file.10.

usbcore C.1. quota -e user C. User john is forwarding all of his mail to joe. D. User john was created with the same UID (User ID) as the removed user named joe. usb-storage Answer: B Question: 36 A newly created user.1. Edquota user B.1 B.1.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D.1. User joe's email is still cached by the system although his UID (User ID) has been removed. The router has an IP address of 10.user D. C.1.1. Which of the following MOST likely caused this? A. usb-ohci D. User john and joe are sharing a home directory. reports that he has access to the file '/var/mail/joe'.1 Answer: A Explanation: route[-v] [-A family] add [-net|-host] target [netmask Nm] [gw Gw] [metric N] [mss M] [window W] [irtt I] Question: 35 Which of the following modules is the first to load to provide any USB functionality? A.1 on the LAN-side interface.common unix printing system daemon Question: 34 A new router is installed to share the Internet connection for all users on the LAN (Local Area Network).1.1. route change gateway 10.quota Answer: A Page 10 of 217 . route add default gw 10. vi /~user/. ifconfig eth0 dstaddr 10. Answer: C Question: 37 A Linux system administrator needs to edit the quotas for a user.1. ifconfig eth0 gateway 10. but should not have this access. usbmain B. Which of the following commands can be used to do this? A. Which of the following commands on the client allows Internet access on the Linux workstations? A. postfix Answer: C Explanation: cupsd . john. vi /quota.1 C.1 D. B.1.

/etc/init. Question: 41 Which of the following commands could be used to show the waiting print jobs on printhost using the CUPS printing system? A. User2group Answer: A Question: 39 How could a user arrange for a command to be run daily at a certain time on a Linux system.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: edquota [ -p protoname ] [ -ug ] [ -r ] [ -F format-name ] username. these services are not enabled. The first five are integers that specify the following: minute (0-59). day of the week (0-6 with 0=Sunday). showqueue -h printhost C. Groupset D. The fields are separated by spaces or tabs.. D..d/telnet In this file. month of the year (1-12). Groupuse C. login to the server as the root userid and edit the files: /etc/xinetd. Specify the schedule using entries in a file at /etc/cron. hour (0-23).d/telnet Answer: D Explanation: Linux is configured to run the Telnet and FTP server. and use crontab to install the file.d/telnet D. find the line for disableand change it from the value "yes" to "no". /etc/xinetd. Use a text editor to create a file in /var/cron that specifies the schedule. Answer: D Explanation: crontab [file] A crontab file consists of lines of six fields each. but by default. Question: 38 Which of the following commands will add a user to a group from a Telnet session? A. day of the month (131). /sbin/init C. Question: 40 Which of the following files can be edited to enable the Telnet service? A. To enable the telnet these service. lpstat -h printhost B. Edit /etc/periodic/cron. /bin/init B. Useradd B. Create a file to specify the schedule. using the cron service? A. cups --queue -h printhost Page 11 of 217 .daily B.conf C.

chmod 4777 /tmp Answer: B Page 12 of 217 . The cron process should have a lower PID (Process ID).sbin is a hidden catalog. Answer: B Explanation: /usr/. C.sbin/httpd 775 ? Ss 0:00 /usr/sbin/X11/xdm 776 tty1 Ss+ 0:00 /sbin/getty 38400 tty1 Which of the following should be investigated? A. The xfs process should not be run in daemon modes.sbin. C. B. D. The getty program should not run with 38400 baud. The /root file system is full. Question: 42 The administrator suspects the system has been compromised and runs the ps command: 615 ? Ss 0:00 /usr/sbin/sshd 624 ? Ss 0:00 /usr/bin/X11/xfs -daemon 707 ? Ss 0:00 /usr/sbin/cron 709 ? Ss 0:00 /usr/. lpr --list-jobs -h printhost Answer: A Explanation: lpstat [ -E ] [ -h server ] [ -l ] [ -W which-jobs ] [ -a [ destination(s) ] ] [ -c [ class(es) ] [ -d ] [ -o [ destination(s) ] ] [ -p [ printer(s) ] ] [ -r ] [ -R ] [ -s ] [ -t ] [ -u [ user(s) ] ] [ -v [ printer(s) ] ] -h server Specifies the CUPS server to communicate with. One of the hard drivs has crashed Answer: C Question: 44 The administrator needs to set permissions on the /tmp directory as follows: drwxrwxrwt 9 root root 4096 Jun 13 09:42 tmp Which of the following commands will accomplish this? A. chmod 1777 /tmp C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. Question: 43 A system is very likely compromised if which of the following has occurred? A. The system is extremely slow B. chmod 0777 /tmp B. The httpd program is not normally in /usr/. Some commands behave abnormally D. chmod 2777 /tmp D.

vfat D. showdrives C. Differential SCSI B. reiserfs Answer: C Question: 48 Which of the following commands could be used to display all recognized drives and all existing partitions? A. 10 kilometers device to device (optical) Question: 46 Which of the following symbols is added to the beginning of the password field in the /etc/passwd file so that the user cannot log in? A. cat /proc/disks Answer: A Explanation: -l List the partition tables for the specified devices and then exit. C. ! D. Question: 49 Page 13 of 217 . Fibre Channel D. xfs B.Turn on sticky bit. / Answer: C Question: 47 On a dual-boot system. If no devices are given. ufs C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: 1000 . those mentioned in /proc/partitions (if that exists) are used. + B. Single-Ended SCSI C. ls /dev/disks/* D. Question: 45 Six Linux servers share a tape library in a different room located 80 meters away. which of the following file systems would be accessible from both Windows and Linux operating system? A. IEEE-1394 Answer: C Explanation: 30 meters device to device (copper). Which of the following technologies would allow these server to connect directly to the tape library? A. fdisk -l B.

Update the root. Page 14 of 217 . which of the following files would be edited to map the power button to the desired command? A. Reinstall Linux from the original install drive and apply all patches.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 If a system uses ACPI (Advanced Control and Power Interface). D.conf B. Use the custom tool provided by the hard drive manufacturer.root file C.hints file. Which is the next course of action? A. 4 D. 3 B. even in single-user mode. 5 C. 12 Answer: A Question: 52 When executed. B. gzip archieve C. Use a bootable Linux medium to boot into Linux and run fsck. /etc/acpi. Answer: B Explanation: fsck is used to check and optionally repair a one or more Linux file systems. /etc/acpi/powerbutton Answer: C Question: 50 The DNS administrator learns that the IP address of one of the Internet root name servers has been changed. Update the named. but hard drive diagnostics indicate that the drive is working properly. bzip2 tarball D. lha tarball Answer: C Question: 53 A Linux system will not boot. B. Which of the following should be done to repair the file system? A. Update the resolve. Update the in-addr. C. /etc/acpi/events/power D. Answer: A Question: 51 To which of the following IRQ settings does ttyS1 default on a Linux server? A.conf file D. what type of installation file is created by the following command? tar cvvjf filename file4 file2 file12 A.conf C. jar archieve B. Use a bootable Linux medium to boot into Linux and run fdisk. /etc/modules.arpa file.

capable of performing real-time traffic analysis and packet logging on IP networks.0. vulnerability assessment. sshd -l user 192. Answer: D Question: 55 The company hires a temporary employee and wants to provide limited access to its production server. sshd -6192.100 B. and network mapping. Intrusion detection.168.conf file and run "fdisk /mbr" D.100 C. bash -r C. Boot using the Linux distribution installation CD and run fsck on the /boot partition. Intrusion detection. content searching/matching and can be used to detect a variety of attacks and probes. C. virus detection.0. Snort uses a flexible rules language to describe traffic that it should collect or pass.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 54 The MBR (master boot record) created from lilo on a system is corrupt. Boot using a rescue disk. B. OS fingerprinting attempts. and much more. B.100 D. and network scanning D. Which of the following would accomplish the goal? A.168. Snort has a real-time alerting Page 15 of 217 .168. SMB probes.conf. and run lilo. How can this be fixed? A.0.conf file and run "fixboot --mbr -t lilo".100 Answer: B Explanation: ssh . and malware detection C. rbash B. bash -limited Answer: B Question: 56 Which of the following commands should be used to allow SSH (Secure Shell) to connect to a server with IP address 192. stealth port scans. Intrusion detection. Boot using a live CD distribution and run chroot. password cracking. Boot using a rescue disk.OpenSSH SSH client (remote login program) -l login_name Specifies the user to log in as on the remote machine -6 Forces ssh to use IPv6 addresses only. verify the lilo. ssh -6 -l user 192. exec bash D. verify the lilo. verify the lilo. It can perform protocol analysis. Question: 57 The primary usages of the Snort application include which of the following? A. ssh -l user 192. and packet logging Answer: D Explanation: Snort is a lightweight network intrusion detection system.0. such as buffer overflows.168.0.168. packet sniffing. as well as a detection engine that utilizes a modular plugin architecture. CGI attacks.100? A. Intrusion detection.

0. C. Which of the following commands searches the "/var/log/wtmp" file and displays who has logged onto the machine and when they logged on? A. or as a full blown network intrusion detection system.0. Set the sticky bit using 'chmod 2770 /home/ourgroup'.120 Answer: A Question: 60 How can the Apache working directory be set to /home/user/html from the commans line? A.168.255. or WinPopup messages to Windows clients using Samba's smbclient. Set the SGID bit using 'chmod g+s /home/ourgroup'. Sets eth0 to listen for all addresses. Set permanent permissions on the directory by running 'mkdir g+s /home/ourgroup'. the eth0 will be set to 192. C. Which of the following actions will accomplish this? A. last D. w B. Answer: A Question: 59 The following command is about to be executed: Ifconfig eth0192. httpd -d /home/user/html B. D. log --list Page 16 of 217 . etc).255. Question: 58 Files created in the /home/ourgroup directory need to automatically have group ownership that is identical to the directory itself. httpd -r /home/user/html C. a user specified file.120 on eth0.0. a packet logger (useful for network traffic debugging.0. Snort has three primary uses. At the next reboot. B. D. It can be used as a straight packet sniffer like tcpdump.168. incorporating alerting mechanisms for syslog. httpd --directory /home/user/html Answer: A Explanation: httpd [ -X ] [ -R libexecdir ] [ -d serverroot ] [ -f config ] [ -C directive ] [ -c directive ] [ -D parameter ] Question: 61 A system administrator routinely needs to see the list of who has logged in and logged out on a machine as well as their login times.168.168. httpd --root /home/user/html D.120 B. Adds an alias for 192. a UNIX socket.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 capability as well. Assign private permissions on the directory using 'chown g+s /home/ourgroup'.0 up Which of the following will this command accomplish? A.120 netmask 255. who C. Sets eth0 to 192.

guest ok = yes B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: C Explanation: Shows login information about users. writeable = yes C. Entries in the /etc/passwd file are added to a new /etc/shadow file. /etc/passwd is renamed to /etc/shadow and a new soft link is created. C.trackn Question: 63 Review the following Samba configuration file entry: [global] workgroup = NT-FAKERS netbios name = DUDE security = share browseable = yes [public] guest ok = yes writeable = yes security = share browseable = yes path = /export/public Which of the following lines allows the user to access the public share on this server without authentication? A. Which of the following commands could do this? A.0. mkisofs /tmp/tocd | cdrecord dev=0. Question: 62 A user wants to copy files in the directory /tmp/tocd to the first recordable CD-ROM (CDRW) device.0Answer: D Explanation: cdrecord [ general options ] dev=device [ track options ] track1. dd if=/tmp/tocd of=/dev/write D. hosts.. The /etc/passwd file is unchanged. mkisofs -o /dev/cd /temp/tocd C. browseable = yes Answer: A Explanation: The guest ok parameter means access will be permitted as the default guest user Question: 64 If the /etc/shadow file does not exist when pwconv is run. security = share D. The system will give an error message. cdrecord -R /tmp/tocd B.. Page 17 of 217 . B. which of the following occur? A. and terminals.

password and aging information) that exist in an /etc/passwd entry will be moved to the corresponding entry in /etc/shadow. 0755 D. servername:sharename /mountdirectory smbfs username=windowsusername. smbmount //servername/sharename /mountdirectory -o username=windowsusername. The manufacturer's development library D. XFree86. The Linux kernel sources for the installed kernel Answer: D Question: 68 Which of the following files holds the XFree86 configuration by default? A. The manufacturer's installation kit C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D.password=windowspassword 0 0 B. 1755 C. //servername/sharename /mountdirectory smbfs username=windowsusername. Password attributes (for example. this command will create /etc/shadow with information from /etc/passwd. The distributor's source code B. but no binary drivers are provided. The drivers may be downloaded in source code form only. Which of the following is needed to make these drivers work? A. XF86Config C.conf B. XFree86Config Page 18 of 217 . Answer: D Explanation: The pwconv command creates and updates /etc/shadow with information from /etc/passwd.password=windowspassword 0 0 D. Password attributes in /etc/passwd are moved to a corresponding entry in a new /etc/shadow file.password=windowspassword Answer: B Question: 66 Which of the following are the default permission of /tmp? A. //servername/sharename /mountdirectory sambafs username=windowsusername. 0222 Answer: A Question: 67 The network card in the server is on the Linux distributor's HCL (Hardware Compatibility List).password=windowspassword 0 0 C. 1777 B. Question: 65 Which of the following fstab entries will mount a Samba share at boot time? A.conf D. If the /etc/shadow file does not exist. XF86.

Answer: D Question: 70 A mid-sized technology firm wants a dedicated machine to analyze data from previous client projects. ypwhich B. /etc/timezone B. /etc/defaults/date Answer: B Question: 73 The pwconv command does the following? Page 19 of 217 . KDE B. MySQL D. D. PHP C. How can it be verified that the package has not been altered? A. C. nispasswd D. Download the MD5 hash file from the original FTP site and compare it against the MD5 hash generated from the downloaded file. Which of the following server packages would MOST likely be installed? A. Uninstall the application and re-install it while in single user mode and carefully watch the install logs for suspicious activity. After installation of the tool. ypcat passwd Answer: D Question: 72 Which of the following files sets the default time zone used by the date command? A. Boot the system from a live CD distribution and run the fsck tool on the partition where the package is installed. suspicious behavior is noted.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: B Question: 69 A system administrator has recently downloaded a network analysis toll from a FTP repository. yppasswd C. /etc/default_time D. Download the MD5 hash file from the original software developer's website and compare it against the MD5 hash generated from the downloaded file. /etc/localtime C. LDAP (Lightweight Directory Access Protocol) Answer: C Question: 71 Which of the following commands can be used to verify that an NIS client is reading authentication information from the NIS server? A. B.

conf C. find .conf Answer: C Question: 77 Which of the following commands will recursively search through all subdirectories from the current directory for files owned by the root user? A. It removes the /etc/shadow file and places the encrypted passwords in the second field of the /etc/passwd file. Help C. POP3 Answer: B Question: 76 Which Apache configuration file controls the mapping of SSL certificates? A. C. find . grep -u root . D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. httpd. moves the encrypted passwords into it. Which of the following can be used to determine which commands are available? A. and places an x in the password field of the /etc/passwd file. SMB C.-uid 0 B. Locate D. Manual Answer: B Question: 75 Which of the following services commonly uses Port 139? A. srm. D. DNS B. It creates the /usr/lib/shadow file. Man B.conf D. FTP D. It removes the /usr/lib/shadow file and places the encrypted passwords in the second field of the /etc/passwd file. moves the encrypted passwords into it. grep -r root . . It creates the /etc/shadow file. and places an x in the password field of the /etc/passwd file. C. the only information showing is the prompt.htaccess B. B.-uname root Answer: A Question: 78 Page 20 of 217 . Answer: C Question: 74 When a user begins to use a shell. access.

56s/guy/gal/gTaken from http://unix. then compiled into it. setpath PATH=$PATH:/usr/local/program1/bin B. In the program's source directory. In the application's specific codec directory D. In the user's home directory B.t-a-y-l-o-r. where should it be placed? A. Partial D. However. Create a script on the administrator's workstation to attach to each server and copy its log files to the local drive. Which of the following is considered the BEST practice method to do this? A. :/s/test/TEST/g C. Incremental Answer: D Question: 82 A system administrator of a 200-server network wants to simplify routine monitoring of log files on each server. As an accessible device in /dev C. Once the correct codec is received. Page 21 of 217 . Full B. PATH=PATH$:/usr/local/program1/bin Answer: C Question: 79 An error was returned stating that the proper MPEG-2 codec could not be found. you can override vi's default of operating only on the current line by preceding them with a range of line numbers. Modular C. Answer: C Question: 80 How can a Linux user use vi to edit the first 30 lines of a 60-line file and replace all occurrences of 'test' to 'TEST'? A. if we wanted to replace guy with gal on lines 32 through 56 we would type :32. :s/test/TEST/g B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 What command should be run in order to add /usr/local/program1/bin to the path and make it active in the current shell? A. setenv PATH=$PATH: /usr/local/program1/bin C. :1.com/VBsr. :30s/test/TEST/g D.html Question: 81 ` backup? A.30s/test/TEST/g Answer: D Explanation: Any command that begins with a ":" is called a line mode command and performs its duty on the line the cursor is currently on. For example. export PATH=$PATH: /usr/local/program1/bin D.

Answer: B Explanation: The answer is to have a special server set up to centrally receive all log files from the different boxes in the network.X11 6 .unused 5 . 3 C. if you do not have networking) 3 . Create a script on each server to analyze each of the log files on the server and forward important information to the administrator's workstation.Single user mode 2 . 0 B. Run logcp at each server. New user templates B.Full multiuser mode 4 . Access control lists C. Question: 83 Which of the following is contained in the init.Multiuser. Service startup scripts D.halt (Do NOT set initdefault to this) 1 . C. Infrared remote control configuration files Answer: C Question: 84 After a power outage. The file systems are unable to be mounted manually. D.conf file on each server so log files are forwarded to 'loghost'. The runlevels used by RHS are: 0 . Reinstall the operating system. C. Modify the syslog. Create a new server called 'loghost'. Answer: D Explanation: fsck is used to check and optionally repair a one or more Linux file systems. 5 D. B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B. Reboot to runlevel 6. Specify the administrator's workstation as the destination and "*" for which log files to forward. D. Which of the following should be done first? A. 6 Answer: B Explanation: Default runlevel. Run fsck on each file system and try to mount again.reboot (Do NOT set initdefault to this) Page 22 of 217 . Edit /etc/fstab and correct any problems identified. Question: 85 Which of the following runlevels is generally used to ensure the Linux server will boot into full multi-user mode without starting X Windows? A.d directory? A. without NFS (The same as 3. a Linux machine reboots but fails to mount all of its file systems.

whereis -time 2 D. dhcpd Answer: D Question: 89 An administrator need to synchronize a workstation's system time with a network server. Question: 87 LPR access for specific hosts can be configured in which of the following files? A. lpd.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 86 How can an administrator prevent /etc/hosts from overriding DNS resolution? A. kerneld B. and group files. NTP (Network Tim Protocol) D. Which of the following services will allow the workstation to automatically set the time? A. Change the order in which DNS and hosts are used by editing /etc/nsswitch. B. Use a higher serial number in the DNS zone file.conf D. utime C. grep / -ctime 2 Page 23 of 217 . hosts. find / -mtime 2 C. printcap B. Time B.conf file is used to configure which services are to be used to determine information such as hostnames. hosts. C. Routed D.allow C.equiv D.allow Answer: C Question: 88 Users being reporting 'Unable to obtain IP address' error messages. Named C. Use a firewall to close the port used by "hosts". NNTP (Network News Transport Protocol) Answer: C Question: 90 Which of the following commands will locate files that have been modified in the past two days? A. Which of the following daemons should the administrator verify is running? A. Move the NIS entry beneath the DNS entries in /etc/resolv. password files. locate -t2 B.conf Answer: D Explanation: The /etc/nsswitch.

top --map -u Answer: A Explanation: pstree shows running processes as a tree. Which of the following is the correct representation of the subnet mask? A. Question: 94 Shadow passwords are disabled on a Linux server. pstree -u B.o-r filename C. Whenever the uid of a process differs from the uid of its parent. 192.0 D.g+w-r. Question: 91 A superuser wants to transform the following permission set from -rw-r--r-.255. the new uid is shown in parentheses after the process name.5.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: B Explanation: find [path. -u Show uid transitions.255. 192. chmod u+x.255.] [expression] -mtime n File's data was last modified n*24 hours ago.o-r filename B. ps --map -u D. 255.168.1 root root 4096 Apr 20 17:30 filename To -rwx-w---. chmod 710 filename D.5.g-w.1 root root 4096 Apr 20 17:40 filename Which of the following commands will accomplish this? A.. including information about userid transition points? A. 255.192 Answer: D Question: 93 Which of the following command lines can be used to show a map of the current process hierarchy. Which of the following appears after a user's name in the /etc/passwd file when a user account is disabled? Page 24 of 217 . chown 720 filename Answer: B Question: 92 The administrator must change the IP address of the server to 192.0 B.168.5.255.168.4/26.255 C.. chmod u+x. psgraph -u C.

Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A.4.o /boot/initrd-2. The driver is also available in the modules directory on the server's hard drive. After booting from the recovery CD-ROM.o -v /boot/initrd-2.rpm.rpm. cat "alias scsi_hostcontroller acme. which runs LILO and uses kernel 2.bz2 C. B. Only root and group owner D. the Acme driver (acme. bunzip package. file owner.o B. lilo append=acme. C. bzip2 --uncompress package. Which of the following commands will fix the problem? A.rpm.o) is manually loaded and works.gz 2.o">>/etc/modules.bz2 D.4.4. then redirect the output to the program 'name3'.bz2 Answer: B Question: 98 A user wants the script 'name1' to process the contents of the file 'name2'.bz2.bz2 B.20 C.20.conf Answer: C Question: 97 A user receives a file named package. X ? & * Answer: D Question: 95 When a user runs s l the following output is displayed: drwxrwxrwt 3 john1 users2 4096 Aug 06 13:42 research Who has permission to delete files in this directory? A. name1 | name2 < name3 Page 25 of 217 . name1 > name2 | name3 D. bunzip2 package. All users B. The system. mkinitrd -f --with=acme. name1 < name2 | name3 C. name1 | name2 > name3 B. will no longer boot.20 D.gz 2.rpm.20. Only root and file owner C. modprobe -p acme.4. Only root. and group owner Answer: B Question: 96 An Acme SCSI controller was installed on the server to support the boot drive. D. Which of the following commands will uncompress the file for use? A.4.rpm. Which of the following shell commands will do this? A.20. bzip -d package.

The swap partition is configured during setup. B. Use the lprm command to remove the report D. and can be extended using the 'swapon' command. The lpq command is used to view the print queue. swap D. but then realizes he needs to make corrections to the report. vfat C. Prints a file. This is not a 'mounted' file system. The command is issued with the job ID to delete a print job. B. 465. ext2 B. The kill command is used to end a process. Sybex Linux + Study Guide: page 39. He now wants to remove the report from the printer queue. Incorrect Answers: A. Smith. but not to delete print jobs.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: B Question: 99 Which of the following file systems CANNOT be mounted by using the mount command? A. You can mount an VFAT file system using the 'mount -t vfat' command. Use the lpq command to remove the job B. Explanation: The lprm command can be used to remove one or more print jobs from the print queue. Question: 100 A Linux user has sent a report to the printer queue. Page 26 of 217 . A user can delete any print jobs that belong to the user. D. Use the kill command to remove the report C. Reference: Roderick W. Sybex Linux + Study Guide: page 557. You can mount an ext2 file system using the 'mount -t ext2' command. Smith. iso9660 Answer: C Explanation: The Swap file system is used as virtual memory. You can mount an iso9660 file system using the 'mount -t iso9660' command (iso9660 is used for CD-ROM drives). Which of the following should be done? A. Reference: Roderick W. It cannot be used to delete individual print jobs. Incorrect Answers: A. Answer: C. Ask the superuser to remove the report from the queue because users cannot do this. Question: 101 What does the lpq command do? A. D. The print queue and job Ids can be viewed with the lpq command.

Removes a print job. C. The /etc/printcap file can be used to set up a printer. C. Question: 103 The system administrator needs to create two new groups. Use the newgrp command. not the lpq command. B. Edit the /etc/inittab file to load without NIS. Answer: B. you would still need the local root password. Shows status of the print queue. Use the groupadd command. Reference: Roderick W. Sets up a printer on the system. Tobler.conf file. B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B. B. Use the passwd command from the administrator group. Explanation: The lpq command is used to display the status of the print queue. C. There is no 'Administrator' group in Linux. Incorrect Answers: A. Inside Linux: Page 466. A sniffer can only be used to capture a password traveling over the network. B. Answer: D. New Riders. Incorrect Answers: A. Smith. The lprm command is used to remove a print job. C. The lpr command is used to print. Use the creategroup command. D. D. Question: 102 A system administrator who has forgotten his root password on a server can do which of the following to change the root password? A. you can boot init into the shell and change the password using the following commands: boot: Linux init=/bin/sh bash# mount -o remount / -rw bash# passwd root Reference: Michael J. The information displayed includes the print job IDs and owners. not the lpq command. D. If you bypassed NIS. Sybex Linux + Study Guide: page 556. Reboot the system in runlevel 1 and use "init=/bin/sh" as a boot option. 'develop' and 'admin'. Answer: D. Which of the following should be done to accomplish this? A. The equivalent is the 'Root' group. You would still need to be logged in to change the password. Use the brute-force password sniffer. Page 27 of 217 . C. Enter the group data in the /etc/group. Explanation: If you forget the root password. not the lpq command.

Incorrect Answers: A. Sybex. C. Reference: Roderick W. There is no group. Reference: Mark Minasi. The -R option makes the command recursive meaning that the ownership will be changed on the entire contents of the directory. Question: 105 A user needs to securely connect to a server. Question: 104 How would an administrator change the ownership of the directory /tmp/data/user1 from the account 'user1' to the account 'user2'? A. The syntax is incorrect. D. telnet Answer: A. Explanation: SSH (Secure Shell) provides a secure connection between an SSH server and an SSH host. Sybex Linux + Study Guide: page 270. tftp D. It cannot be used to create a group. B. Page 28 of 217 . It should only be entered once. Explanation: The syntax of the chown command is 'chown <new owner> <directory/file>'.conf file. Incorrect answers: A. chown -R user2 /tmp/data/user1 D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: The groupadd command is used to create new groups. rsh C. All data and passwords are encrypted over the connection. Smith. chown -R /tmp/data/user1 user2 C. It is mandatory that encrypted passwords be used. The newgrp command is used to change a user accounts group membership. Sybex Linux + Study Guide: page 368. Linux for Windows NT/2000 Administrators: page 212. Smith. ssh B. The new owner should be entered before the directory/file name. Which of the following network utilities should be used? A. chown /tmp/data/user2 user 1 B. Reference: Roderick W. The new owner is entered twice. D. chown user2 /tmp/data/user1 user2 Answer: C. Creategroup is a non-existent command.

makemap newaliases C . /etc/skel C. Explanation: The /proc directory isn't actually a directory. It doesn't contain any machine specific data.conf file C. TFTP (Trivial File Transfer Protocol) is used to transfer files over a network. RSH (Remote Shell) is very insecure. Telnet sends passwords in plain text.conf file. It is not used to securely connect to a server. The /etc/hwinfo. Question: 108 When a new user account is created. It's a virtual file system created by Linux to provide information about hardware devices. The /usr directory contains Linux documentation and program files.conf file D. /etc/default Answer: B. D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Incorrect answers: B. Incorrect Answers: B. Explanation: Page 29 of 217 . For example. There is no hwinfo. C. D.newaliases B . the default settings are copied from which of the following? A.d/aliasd restart Answer: A Question: 107 A system is going to have its memory and CPU upgraded. /etc/start D. There is no hwinfo. The /dev/hwinfo. /usr/skel B./etc/init. RSH should be disabled on servers. Question: 106 Which of the following commands should be run after editing the /etc/aliases file in order for sendmail to recognize any changes to that file? A . The /proc directory B. This information will be created in Linux in which of the following? A. Sybex Linux + Study Guide: page 476.conf file.killall -HUP sendmail D . It allows a user on one system to run programs on another system without authentication. C. Smith. the command 'cat /proc/cpuinfo' will display information about the CPU. The /usr/src/linux/devices directory Answer: A. Reference: Roderick W.

This is the incorrect path to the default user account configuration files. Explanation: The diff command is used to display line by line differences between pairs of text files. Reference: Roderick W. then Linux assumes that you want to change to the root user account. The -rf option. D. su "rm 'rf /tmp*" D.oreillynet. filediff Answer: B. when issued from a non-root user. the default configuration files are copied from the /etc/skel directory. Sybex Linux + Study Guide: page 260. comp B. The -c option tells Linux to run a command in the context of the root account.demon. su -c "rm -rf /tmp*" Answer: D Explanation: The su command is used to switch to another user account. C. This is the incorrect path to the default user account configuration files. make the command recursive and forceful (i.e. D.html Page 30 of 217 . Smith. This is the incorrect path to the default user account configuration files. The rm command is used to remove the files. Question: 110 What command.com/linux/cmd/s/su.uk/ccfaq/common. C. Reference: http://www. compare D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 When a new user account is created. it won't ask you to confirm the file deletion). Question: 109 Which if the following commands can be used to compare two text files to find out how they are different? A. There is no compare command. rm -rf /tmp/* -su C. will remove all files from the /tmp directory by prompting the user for the root password? A.numenor.co. Reference: http://www. If no username is specified with the su command.htm Incorrect Answers: A. There is no comp command. although 'compare' can be used as an option for the 'tar' utility. There is no filediff command. Incorrect Answers: A. cirtmp B. diff C.

B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Incorrect Answers: A. B. You must use su to switch user before the remove command. Reference: Roderick W. this command positions you at the given line number. "25G" puts you on line 25. For example. mv D. rm B. tar -cvf www. :25 B. You must use the "G" command to go to a specific line.sourceforge. Question: 111 Which of the following commands can be used to go to the 25th line of a file in vi? A. 25G C.tar /home/httpd/ B. There is no cirtmp command.5 Incorrect Answers: A. You must use the -c option with su if you want it to run a command after switching user. Question: 113 A customer wants to backup her entire Website into a file. Sybex Linux + Study Guide: page 523. mkdir Answer: D. Reference: http://vimdoc.txt#03. The mv command is used to move or rename a file or directory.net/cgi-bin/vim2html2. The rm command is used to remove a file or directory.tar Page 31 of 217 . Smith. tar -cvf /home/httpd /dev/st0 C. The ls command is used to list the contents of a directory. The "G" is case sensitive and follows the line number. Incorrect Answers: A. Explanation: The mkdir command is used to create new directories. D. The "G" must follow the line number. C. Question: 112 Which of the following commands can be used to create new directories? A. Which if the following commands would best accomplish this? A. C.pl?page=usr_03. g25 Answer: B. With a count. tar -cvf /home/httpd/ webbackup. Explanation: The way to go to a specific line in Vi is to use the "G" command. ls C. G25 D. C.

createMask Answer: B. D. the contents of the /home/httpd directory (the default location for a website) are backed up to a file named www. You must specify a filename when using the tar command. Reference: Roderick W. To deactivate Smith's account. Page 32 of 217 . Sybex Linux + Study Guide: page 258. these default settings are known as the user mask can be changed with the umask command. D. To indicate that Smith's home directory is shared by other members of his group. The mask command is used when configuring the IP address of a Linux computer. you must use the '--file' option. umask C. Incorrect Answers: B.tar. the file has a default set of permissions. In this question. To indicate that Smith is a superuser. B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. For example. verbose and forceful. tar -cvf /dev/st0/web. Createmask is a non-existent command. However. Fmask is a non-existent command. when using 'tar' to backup to a tape drive. Reference: Roderick W. Answer: A. D. Smith. the creator of the file is the owner of the file and the group is the owners primary group. Explanation: When a file is created.tar /home/httpd/ Answer: A. To force Smith to change his password at his next login. Smith. C. mask B. The -cvf options mean compressed. The source files and destination file are in the wrong order. C. C. Sybex Linux + Study Guide: page 194/5. fmask D. This command is trying to backup the files to a tape drive. Question: 114 Which of the following commands is used to set default file permissions for any newly created file? A. Incorrect Answers: A. However. Question: 115 The following is an extract in a password file: Smith: * : 1133 : 334 : John Smith: /usr/people/jsmith: /bin/tcsh What is the purpose of the "*" IN Smith's password field? A. Explanation: The syntax of the tar command is 'tar <options> <filename> <files to add>'.

The user will not be able to log in when the password field contains a "*" because the account is disabled. Question: 116 A Linux system is planned to have both an Ethernet card and a modem. Reference: Michael J. New Riders. D. Explanation: The pump command is used to verify that the computer is receiving DHCP information from the DHCP servers. Router Answer: B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: When you create a user account with the adduser command. The "*" is in the password field and so is not related to the users' home directory. XFree86 D. C. Incorrect Answers: B. Page 33 of 217 . Explanation: XFree86 provides a graphic user interface and is installed by default when a workstation installation is selected. Tobler. The "*" is in the password field and so does not indicate that the account is a superuser. A. To enable the account. On each of these networks the IP addresses are dynamically assigned. You can disable an account by placing a "*" in the password field of the password file. Smith. DNS (Domain Name System) is used to resolve host names to IP addresses. netmask and DHCP server address. Pump C. you must specify a password with the passwd command. It would not be useful in this case. It would not be useful in this case. Question: 117 Which if the following services is installed when a "workstation" installation is selected? A. SNMP D. the account doesn't have a password. Reference: Roderick W. The password field in the password file contains a "*". Incorrect Answers. DNS B. nntpd B. SNMP (Simple Network Management Protocol) is used for the monitoring of hardware devices. dhcpd Answer: C. C. Sybex Linux + Study Guide: page 628. It's output included the IP address. Which if the following services should be considered for installation? A. It would not be useful in this case. D. A router is used to route traffic between networks. Squid C. Inside Linux: Page 397.

It provides a second level of encryption for the /etc/passwd file. In the /usr/sbin directory. This is a server service and is not installed in a workstation configuration. B. In the master boot record. C. not the /root directory. When using the Shadow Password Suite. the users' passwords are stored in the /etc/passwd file. Sybex Linux + Study Guide: page 117-118. Sybex Linux + Study Guide: page 22. Where will LILO be installed? A. Explanation: If you are not using the Shadow Password Suite. The Shadow Password Suite does not encrypt the password file. This is a server service and is not installed in a workstation configuration. The Shadow Password Suite does not change the password encryption. Smith. B. Squid is a proxy server application. D. Reference: Roderick W. Page 34 of 217 . The Shadow Password Suite does not change the password encryption. LILO is installed by default in the Master Boot Record. NNTPd is the Network News Transfer Protocol daemon. D. DHCPd is the Dynamic Host Configuration Protocol daemon. Smith. D. Smith. Reference: Roderick W. Incorrect Answers: A. B. This is a server service and is not installed in a workstation configuration. Answer: C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Reference: Roderick W. LILO is installed by default in the Master Boot Record. Answer: C. Question: 119 Why is the Shadow Password Suite important? A. It moves the passwords to a separate file and will also encrypt the password file. B. not the /boot directory. not the /usr/sbin directory. C. Explanation: LILO (the Linux boot loader) is installed by default in the Master Boot Record (MBR). It moves the passwords to a separate file that has more restrictive permissions. B. Question: 118 Linux will be installed on a new system. Incorrect Answers A. which can only be read by the root user. Sybex Linux + Study Guide: page 212. In the /boot directory. D. the passwords are moved to another file. Incorrect Answers: A. D. It improves the encryption for all passwords in the /etc/passwd file. This file can be read by anyone. In the /root directory. LILO is installed by default in the Master Boot Record.

/etc/init.org. Linux requires a root (/) partition. the operating system does not recognize the new card. Page 35 of 217 . Linux requires a root (/) partition. Change the network routing table. Reference: Roderick W. not a /boot partition. iftonfig lo B . D. How could an administrator restart the network services and test that the interface and the DHCP server are functioning properly? A . Linux requires just one partition to install and boot. The local system has been reconfigured to connect using DHCP.linuxheadquarters. Reference: http://www./usr/bin/network restart.d/network restart. Netstat is not the correct command to restart the network services. This is the root partition. / B. which is known as the / partition./sbin/route restart. The new card is verified as Linux compatible. /var C.d/network restart command. Incorrect Answers: B. not a /etc partition.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 120 Which if the following is the only required partition when Linux is installed? A. not a /var partition. /etc D. Linux requires a root (/) partition. C. Ifconfig is not the correct command to restart the network services. Explanation: At a bare minimum. ping comptia.shtml Incorrect Answers: A. You can verify that that your computer has received the DHCP settings by pinging and internet address such as comptia. Smith. C. Route restart is not the correct command to restart the network services.org D . and is replaced by one from a different manufacturer.com/howto/networking/networkconfig. Which if the following is necessary to finish the installation? A. /boot Answer: A. When the system restarts. Question: 122 The Ethernet card fails on a Linux machine without modular support./bin/netstat-R.d/init. B.org C . Question: 121 A DHCP server has been added to the network. Sybex Linux + Study Guide: page 37. ping comptia. ifconfig eth0 Answer: D Explanation: After configuring DHCP you need to restart the network services with the etc/rc.

4. tar xzvf linux-2.3. The tar command invokes the tar program. The 'v' option means verbose mode and the 'f' option means to force the operation with any conformation messages. C.gz C.3. ps aux | grep dhcpd D. The old driver is integrated into the kernel and needs to be removed. Smith. Explanation: A network card without modular support will have its drivers integrated into the kernel. tar xvf linux-2.tar. Incorrect Answers: A.3.gz".3.4.4. you'll need to recompile the kernel to remove the old network card driver. What command should be issued first? A.gz extension indicates that the file has been tarred and compressed (zipped) using the tar and gzip programs. You need the 'z' option to invoke gzip. Reference: Roderick W.tar.tar. gzip -q linux-2. Sybex Linux + Study Guide: page 211.4. The routing table is unrelated to the physical network card or its drivers.gz.gz B.gz. The downloaded file is named "linux-2. C. D. rpm -check dhcpd Page 36 of 217 .tar. dhcpd -restart C. The 'x' option means extract. Which if the following should be run to see if the process is running? A.4.tar. You need to use the tar program and invoke gzip with the 'z' option.tar Answer: B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B. The 'z' option means use gzip to uncompress the files.3. Incorrect Answers: A. Smith. gzip -c linux-2.4.3. D. Explanation: The .tar D. tar cvf linux-2.tar. Sybex Linux + Study Guide: page 194-195. Edit the Ethernet configuration file to point to the new device. Question: 124 An administrator has installed a DHCP daemon. Answer: B. Reference: Roderick W. Recompile the kernel with support for the new device.4. Question: 123 A client has downloaded the latest Linux kernel source and wants to compile and install it on a home machine. Download a new driver and add it to the /dev directory. You need to use the tar program and invoke gzip with the 'z' option. C. top B. tar xvf linux-2.3. The first thing to do is to extract the files using the same programs. D. You need to recompile the kernel to remove the old network card driver. If you replace the network card with one from a different vendor.

The pipe (|) passes the output to the grep utility. ReiserFS Answer: B. Write and read D. C. It will not verify the process is running. Explanation: The ps aux command displays all the running processes. Grep is a search utility. Explanation: You can list the contents of a directory with the read permission. The dhcpd -restart command will restart the DHCP daemon. B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: C. the customer asked for the ability to expand the partition size. to enter the directory. FAT32 D. The top command displays the running processes that are using the most CPU time.unixgeeks. Reference: http://www. The DHCP daemon doesn't use much CPU time and is therefore unlikely to be displayed using the top command.html#ps Incorrect Answers: A. Read only B. The write permission will allow to create files in the directory.org/security/newbie/unix/man9/misc3. Execute and read Answer: D. The execute permission will not allow you to list the contents of the directory. B. you need the execute permission. Grep dhcpd will search for dhcpd in the output from the ps aux command. Execute only C.firstlinux. D. Question: 126 While a technician was installing Linux on a customer's server. This is not the minimum required permission to enter a directory and list its contents. The read only permission will not allow you to enter the directory. Question: 125 What minimum permission must a directory have for a user to both enter the directory and list its contents? A.com/articles/cards/permissions. Explanation: Page 37 of 217 . However.shtml Incorrect Answers: A. HPFS B. The rpm command cannot be used to verify that a process is running. ext2 C. as needed. Reference: http://www. Which of the following would best provide this ability? A.

Incorrect Answers: A. Smith. D. Apache and Squid C. There are more utilities to expand an ext2 partition than partitions with the HPFS file system. D. Defragment the drive using the computer's current operating system. Smith. Create ext2 and swap partitions on the hard drive. Question: 128 Which if the following should be done before installing Linux on a home computer? A. C. Smith. The partitions can be created during the installation. Reference: Roderick W.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 There are more Linux utilities to expand an ext2 partition than partitions with a different file system. Incorrect Answers: B. Upgrade the computer's memory to at least 64 MB. Reference: Roderick W. D. It is not necessary to create them before the installation. ipchains and BIND D. C. B. Reference: Roderick W. Apache and BIND B. C. IPChains is a firewall program. Linux will run on systems with less than 64 MB or RAM (memory). Incorrect Answers: A. Sybex Linux + Study Guide: page 56. B. Explanation: The Linux web server software is called Apache and the Linux DNS software is called BIND. Page 38 of 217 . Verify the hardware on the Linux hardware compatibility list. Sybex Linux + Study Guide: page 542. Squid and ipchains Answer: A. 59. Answer: C. There are more utilities to expand an ext2 partition than partitions with the FAT32 file system. Sybex Linux + Study Guide: Chapter 1. Squid is a proxy server program and IPChains is a firewall program. There are more utilities to expand an ext2 partition than partitions with the ReiserFS file system. Explanation: The first thing to do before installing any operating system is to ensure that the system hardware is compatible with the operating system. Question: 127 What services would need to be installed to build a combination Web server and Domain Name Server (DNS)? A. Squid is a proxy server program.

It does not provide web server services. NFS B. MySQL is a Linux database program. /dev/lp0 B. Question: 129 Which of the following services would need to be installed and configured in order to provide proxy and caching services to a Linux network? A. Which of the following Linux services should be used? A. It does not provide web server services.apache. The hard drive will be partitions and formatted during the installation and therefore will not need defragmenting.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. Squid C. BIND is the Linux DNS software. B. Question: 131 A user wants to set up his parallel port printer on the workstation's first parallel port. Question: 130 A customer wants internal office information to be accessible by employees through a Web browser.org/ Incorrect Answers: A. C. ipchains Answer: B. Sendmail Answer: C. D. /dev/lpa Page 39 of 217 . It does not provide web proxy services. NFS is the Linux Network File System used for sharing files over a network. Explanation: Apache is the Linux web server software. Squid B. MySQL C. Reference: http://www. IPChains is the Linux Firewall software. Apache D.org/ Incorrect Answers: A. Explanation: Squid is a full featured web proxy program running on Linux or Unix. BIND D. Sendmail is a Linux email server program. Reference: http://www.squid-cache. D. It does not provide web proxy services. Web server software is needed to enable employees to access office information through their web browsers. Squid is the Linux web proxy software. It does not provide web server services. It does not provide web proxy services. What device identifier needs to be used during configuration? A.

conf file into an installed boot loader. by editing the lilo. However. Document and log standards and changes to the systems. Fdisk/mbr will write a new master boot record. Tty signifies a modem. Smith. not a parallel port. run "fdisk /mbr" D.conf file. The first parallel port number is zero. Parallel ports use the 'lp' identifier followed by the number of the port. LILO needs to be run only after editing the lilo. D. It does not restore the master boot record.conf C. Reference: Roderick W. /dev/tty0 Answer: A. Parallel ports use lp followed by a numeric identifier. Explanation: Page 40 of 217 .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C. Explanation: Hardware devices are identified in the /dev 'folder'. Print out script source files. Explanation: LILO (the Linux boot loader) consists of a program that converts the lilo. D. The first parallel port number is zero. Incorrect Answers: B. C. How could the Linux record be restored? A. C. Smith. Incorrect Answers: A. run "/sbin/lilo" Answer: B. Sybex Linux + Study Guide: Page 548/9. Question: 132 A user has overwritten the master boot record. Question: 133 Which of the following actions will provide the greatest benefit to system administration in a large organization? A. C. Answer: C. Update packages and kernels as updates are released. Sybex Linux + Study Guide: Page 218. /dev/lp1 D. The first one being zero. edit lilo. Therefore. edit fstab B. Lp1 signifies the second parallel port. B. such as RPMs. it does not write a Linux boot loader into the master boot record. therefore the first parallel port would be listed as /dev/lp0.conf file. you can instruct LILO to recreate the linux boot loader in the master boot record. The fstab file instructs Linux which partitions to mount and where to mount them. Install all packages from the same source type. D. Reference: Roderick W.

Incorrect Answers: A. this is an unlikely situation. B. Printing out scripts would not aid system administration.out C. You must precede the command with "/" or ". Sybex Linux + Study Guide: Page 438. you are running the program from the root directory. Linux has limited support for these modems.out. the modems are usually Winmodems./" means to go Page 41 of 217 . D.linmodems.user. Explanation: When computers are supplied with internal PCI modems. Linux does have limited support for internal modems. Question: 134 A new computer came preconfigured with an internal PCI modem.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 It is highly recommended that you document the systems and company standards. Explanation: You cannot run a command if you are in the same directory as the program. a. Smith. The modem is not Hayes compatible. Which of the following is most likely the cause of the problem? A. Reference: Roderick W. C. After Linux was installed. Packages can be installed from various source types as long as the installations are documented. B. D. Rockwell chipsets are not a requirement for modems running under Linux. Reference: http://www. Question: 135 A system administrator is logged into a system as root. Most modems are Hayes compatible and therefore. so the program would need to be in the path.out Answer: A. su . The installed kernel does not support Winmodems. When trying to run the command /usr/local/bin/a.out D.out B.out: command not found What command should be issued to start the program? A. Package and kernel updates should be thoroughly tested before being installed. D. When you precede the command with "/"./". chown root a.org/ Incorrect Answers: A. the modem does not respond. Answer: C. the administrator does the following: root@linux> cd /usr/local/bin root@linux> a. B.out bash: a. Linux does not support internal modems. Linux requires modems that use the Rockwell chipset. chmod o-x a. ". /a.

Modprobe with no options loads a module. B. Question: 137 Which command will verify that an NIS client is bound to an NIS server? A. Explanation: The modprobe -r command is used to remove modules. D. Without arguments. ypconfig D. Nisbind is not the correct command.html Incorrect Answers: B. Smith. Incorrect Answers: B. insmod C. There is no modconfigurator command. modprobe D. The chown command is used to change ownership of a file. ypwhich B. Question: 136 Which utility can remove. Insmod can only insert a module. Page 42 of 217 . For example. ". Sybex Linux + Study Guide: Page 573.out. so changing accounts is unnecessary. lsmod B. Reference: http://www. The su command is used to run a command under a different account. Sybex Linux + Study Guide: Page 432. C. The question states that you are already logged in as root. This is unnecessary because you are running the command as root./" would go back to the /usr/local folder and run the command /bin/a. The chmod command is used to modify the permissions on a file. Ypconfig is not the correct command.com/linux/cmd/y/ypwhich. Lsmod can only list the modules. nisbind C. and add modules.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 back one level in the directory structure and run the command from there. Modprobe -a lists all the modules. as well as autoclean? A. list. C. Reference: Roderick W. Explanation: The ypwhich command returns the hostname of the NIS server. D. Smith. Modconfigurator Answer: C. Reference: Roderick W. It is not required here. ypwhich displays the NIS server for the local machine.oreillynet.client Answer: A. nis. Incorrect Answers: A. in this question. Modprobe -k is used to autoclean the modules.

conf file.conf file. Smith.conf file for its configuration. ftp.168. Question: 139 In an Apache default installation.org B. D.client is not the correct command. These services rely on the /etc/syslog.conf file.18 C. Reference: Roderick W.html Incorrect Answers: A. not the /usr directory.conf file is in the /etc directory. Incorrect Answers: B. Reference: http://www. Question: 138 Which of the following files would modify the daemon which logs system activity? A. httpd.html file. apache.168. C. telnet 168.root file. The DocumentRoot parameter is specified in the httpd.root D. not the httpd. nslookup www. /usr/syslog. Nis.conf B. Systemlog. /etc/syslog.conf Answer: B. httpd. The DocumentRoot parameter is specified in the httpd. ping 168.org Page 43 of 217 .18 D.html B.redhat. Sybex Linux + Study Guide: Page 292. which of the following configuration files contains the DocumentRoot? A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. The syslog. C. Explanation: Apache is the Linux web server software.comptia.conf C. Systemlog.conf Answer: A. not the apache. not the root. Question: 140 How should an administrator test that Domain Name Services (DNS) are working correctly on a client workstation? A. /usr/etc/systemlog.conf is the wrong filename. Explanation: Most system logs are maintained by the system log daemon and the kernel log daemon.conf is the wrong filename.1-Manual/ref-guide/s1-configuration-config. The Document root parameter specifies the default location for the web pages. /etc/systemlog.168.conf file.conf file for their configurations.comptia.conf C. D.168. The DocumentRoot parameter is specified in the httpd.conf D.com/docs/manuals/linux/RHL-7. root. It uses the httpd.

Attacks from machines using TCP. Incorrect Answers: B. C. Exploitation of ICMP security holes. An "fstab" entry that allows only root to mount the CD-ROM. not the mtab file. An "fstab" entry that lets any user mount the CD-ROM. C. The 'user' option allows any user account to mount the CD-ROM. Telnetting an IP address will not test DNS.comptia.org is the FQDN for a machine called ftp in the comptia. The command "nslookup www. Inside Linux: Page 195. user. The line is from the fstab file. C. Answer: A. B. New Riders. Page 44 of 217 . Question: 141 Review the following entry: /dev/cdrom /cd iso9660 ro. The noauto option prevents the CD-ROM being mounted at boot time. Incorrect Answers: A. The first '0' means that the CD-ROM shouldn't be backed up and the second '0' means that the CD-ROM file system shouldn't be checked for errors when the machine boots. Explanation: The nslookup utility is used to query a DNS server. Question: 142 Configuring hosts.org if the DNS is correctly configured on the workstation and the DNS server is functioning correctly.deny and hosts. Ftp. It is not a command that will test DNS. Reference: Roderick W. Pinging an IP address will not test DNS. Noauto means that the CD-ROM won't be automatically mounted when the system boots. D.comptia. Sybex Linux + Study Guide: Page 400/1. Attacks from machines using IPX/SPX. noauto 0 0 What is this entry? A. Exploitation of services that are started with TCP wrappers. C. D.org domain.org" will return the IP address of www. Tobler. An "mtab" entry that mounts a CD-ROM as a read-only device at boot time. Reference: Michael J. D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: D. An "fstab" entry that mounts a CD-ROM as a read-only device at boot time. B.comptia. Iso9660 is the file system for the CD-ROM.allow will protect the server from intruders that attempt which if the following? A. Explanation: This entry in the fstab file allows any user to mount the CD-ROM (/dev/cdrom) in the /cd directory. Smith. B.

deny files. Mgetty is not used to test modems. A web browser Answer: B. not TCP. C. pppconfig D.deny files. not IPX/SPX. Question: 143 A user has installed and configured an internal modem to connect the workstation to the Internet. TCP Wrappers use the hosts. When a server service is requested. B. PPPconfig is not used to test modems.allow and hosts. inetd hands the request to TCP Wrappers.html Incorrect Answers: A. used for testing PPP connections (Modems use PPP to connect to the Internet via an ISP). mgetty B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: D. Smith. Question: 144 Which of the following commands is used to associate a logical 32-bit or 128-bit IP address with a physical Ethernet device? A. A web browser could be used to test Internet connectivity. Incorrect Answers: A. minicom C.com/catalog/debian/chapter/ch11_07. Sybex Linux + Study Guide: Page 363/4. but it can't test the actual modem.allow files and starts the server service if the requesting client has permission. Page 45 of 217 . masq C. Explanation: Minicom is a graphical utility that runs in a console.deny files. D. not ICMP. The user claims that the modem is not connecting properly. mount D. route Answer: A. Explanation: ARP (Address Resolution Protocol) is used to map hardware addresses (sometimes referred to as MAC addresses) to IP addresses. Explanation: Inetd is a service that listens for network connection and starts a requested server service. What diagnostic tool can be used to test the modem? A. arp B. Reference: Roderick W.allow and hosts. TCP Wrappers then authenticates the request by using the hosts. C.deny and hosts. Inetd can use a service called TCP Wrappers to start the server services. TCP Wrappers use the hosts. Reference: http://www.oreilly.allow and hosts. TCP Wrappers use the hosts.

The route command is used to add a static route to a routing table. D. It is not used to associate hardware addresses with IP addresses. Masq is not used to associate hardware addresses with IP addresses. Sybex Linux + Study Guide: Page 653.oreillynet. find B. Before rebooting. whereis Answer: B. Smith. Incorrect Answers: A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Reference: http://www. which of the following commands could be entered to help ensure the system restarts into a stable state? A. C. lilo D. Explanation: The grep command can search the contents of files for a specific string. Smith. Uptime is a utility that displays the uptime of a system (the time a system has been running). It does not check the file system for errors.com/linux/cmd/a/arp. D. grep C.html Incorrect Answers: B. The fsck (File System Check) command will check the file system for errors. Reference: Roderick W. sync B. Lilo is the Linux boot loader. search D. The mount command is used to mount a hardware device. It is not used to associate hardware addresses with IP addresses. Explanation: An unstable system could be caused by file system errors. Sync is used to ensure file system integrity when shutting down a machine. C. It does not check the file system for errors. Question: 146 Which of the following commands searches the contents of files for a specific string? A. fsck C. Reference: Roderick W. Sybex Linux + Study Guide: Page 461. with several services unresponsive. . uptime Answer: B. Question: 145 A Linux system seems to be unstable. Incorrect Answers: Page 46 of 217 .

The application is installed and tested. B. Check any error log generated by the application and the manufacturer's Website for known \ issues or patches.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. After killing the process. C. D. If the problem is caused by a known issue. It does not search the contents of the files for a specific string. C. Explanation: POP3 and Telnet are two separate server services. Answer: D. Go to /etc/log/<name of application>. C. The whereis command is used to locate the binary file. B. Reinstall the application and restart X. Restarting the lmap service won't affect the POP3 and Telnet services. C. The application may not generate an error log in this path. but it won't affect the Telnet problem. the problem will reoccur after reinstalling the application. you should look for any error messages in the logs and go to the manufacturer's website to see if the problem is a known issue or if there is a patch (update) for the application. lmap B. It does not search the contents of the files for a specific string. Question: 148 A customer reports that his server will not allow users to retrieve their email through POP3 or connect to the server via telnet. Question: 147 A system is built for a new employee who needs a particular application for computing critical data. It is unlikely that the POP3 and Telnet services would both fail at the same time. The application suddenly hangs. snmp C. Page 47 of 217 . D. Reference: Roderick W. which of the following is the best course of action to take? A. What service needs to be restarted? A. The search command does not search the contents of the files for a specific string. The application may not generate an error log in this path. Smith. inetd Answer: D. Go to /usr/local/apps/logfile to access specific information. Incorrect Answers: A. source code or manual pages for a specified command. These services are controlled by the inetd service. It is more likely that the problem lies with the inetd service. pop3 D. Restarting the snmp service won't affect the POP3 and Telnet services. Incorrect Answers: A. Restarting the POP3 service may solve the POP3 problem. Explanation: To troubleshoot a faulty application. Restarting the inetd service should rectify the problem. Sybex Linux + Study Guide: Page 286.log to read the error messages. The find command is used to search for files that meet specified conditions (such as type). B.

This file would not be generated by Cron. Page 48 of 217 . B.wbglinks. These are the wrong paths to the system log files. Incorrect Answers: B. These are the wrong paths to the system log files. It has the following permissions: -r-sr-srwk 1 root root 531 Jan 19 02:15 shell.log /etc/boot/messages C. D. He finds a file in his home directory that he has never seen before. Sybex Linux + Study Guide: Page 293.html Incorrect Answers: A. Explanation: The file is owned by the root user account and the root group account.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 149 What are the full paths to the general log files that can be accessed to find out how a system is running? A. C. The file is included in most common distributions. /var/spool/logs/messages /var/spool/logs/dmesg /var/spool/log/install. C. Reference: Roderick W. /etc/bootlog. The file is not included in users' home directories in most distributions.log /usr/local/messages /tmp/boot. Smith. Answer: B. These are the wrong paths to the system log files.log D. D. This file was created when the root account security was breached.net/pages/reads/linux/filepermissions. The file was generated by cron. Question: 150 A user notices some problems with his Linux system. /var/log/messages /var/log/mail /var/log/wtmp B.log /var/log/install. Reference: http://www. The root account put the file there for his use. Explanation: Most system log files are stored in subdirectories of the /var/log directory.run Where did the file come from? A. C.log Answer: A. /usr/local/install.

The kill command is used to stop a single instance of a process. Explanation: Server service (such as HTTPd) problems can usually be resolved by restarting the service. Reference: Roderick W. When asked about recent work done on the machine. you would use the 'killall' command. she responds that the server has not been reconfigured recently and normally performs without problems.exp for incompatibilities. Incorrect Answers: A.conf 955 ? S 0:00 httpd 956 ? S 0:00 httpd 957 ? S 0:00 httpd 958 ? S 0:00 httpd 958 ? S 0:00 httpd 958 ? S 0:00 httpd 958 ? S 0:00 httpd 958 ? S 0:00 httpd 1080 tty1 S 0:00 /sbin/mingetty tt /etc/httpd/conf/http-perl.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. The output above shows that there are numerous instances of the httpd service. To stop multiple instances of a process. C. Smith. Question: 151 A customer calls the support desk and complains that her company's Web server is not responding to requests from Web clients. Stop the Web server by using "killall http" and restart it using "/usr/sbin/httpd".conf 1721 pts/1 R 0:00 ps -x What is the best way to resolve this issue? A. B. Sybex Linux + Study Guide: Page 519. A root account security breach would not generate this file.pid 625 ? SW 0:00 [lockd] 636 ? SW 0:00 [rpciod] 646 ? S 0:00 rpc. Page 49 of 217 .statd 796 ? S 0:00 gpm -t ps/2 814 ? S 0:00 httpd-perl -f /etc/httpd/conf/httpd-perl. Restarting the httpd service should be the first step to resolving the problem. C. There are multiple instances of the httpd service that need to be stopped before restarting the service. D. Examine the httpd module list in /etc/httpd/modules/httpd.net 526 ? S 0:00 syslogd ~m 0 579 ? S 0:00 crond 595 ? S 0:00 xinetd ~reuse ~pidfile /var/run/xinetd. It will not stop multiple instances of a process.misc 462 ? S 0:00 /usr/sbin/automount " "timeout 60 /net yp /auto. D. Answer: B. Use "/usr/sbin/httpd -r" to restart the Web server. A process list on the machine gives the following result: PID TTY STAT TIME COMMAND 1 ? S 0:04 init 444 ? S 0:00 /usr/sbin/automount " "timeout 60 /misc file /etc/auto. Stop the Web server by using "kill -9 <pid>" and run fsck to make sure the /home httpd partition is functioning properly.

C. Denial of Service Answer: D. It will not identify the currently installed version. Reference: Michael J. The man elm command will display the manual pages for the elm program. D. Explanation: A Denial of Service (DoS) attack is where multiple connection requests are made to a server without completing the connection. Trojan horse C. C. Incorrect Answers: A. This loads the server which prevents it communicating on the network. What kind of attack was initiated? A.rpm" do? Page 50 of 217 . Run "version elm" D. Smith.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 152 A user executed a Pearl script that initiated a connection request to a server without ever completing the network connection. Buffer overflow D. Inside Linux: Page 385. Reference: Roderick W. Question: 154 What does the command "rpm -Uvh package-update-3. New Riders. Checking the log files for the rpm package will not identify the currently installed version of Elm. Sybex Linux + Study Guide: Page 178. Spoofing is sending data from a 'fake' network address. Tobler. Check /var/log/rpm Answer: B. The version elm command is an invalid command. Incorrect Answers: A. This was done multiple times until the server could no longer communicate on the network. Spoofing B. Question: 153 A user wants to have the latest version of elm installed. A Trojan horse is a method used to gain entry to a system. B.i386.5. This is not described in the question. This is not described in the question. A buffer overflow is not described in the question. Explanation: The rpm -q command will query a package for information. Which of the following will identify the currently installed version? A. Run "man elm" B. The information will include the installed files and their versions. Run "rpm -q elm" C.

C. Explanation: The rpm -Uvh command upgrades a package. C. B. Allows the user to view hidden files installed with the package. Sybex Linux + Study Guide: Page 254. Also. This provides the installation status. D. Question: 155 An application is created that is called through the Web server. The 'v' option is for verbose mode. The application does not have sufficient rights to write the directory specified. Question: 156 Based on best practices. C. The 'vf' option is used to verify an installation. Change the application to write its error logs into the /root directory. Incorrect Answers: A. Answer: D. so the suid bit on the application must be set to allow it to run as root. Inside Linux: Page 340. Only the application within it needs to run as root. B. B. it is discovered that the application is not writing its error to the Web error log properly. Explanation: It is most likely that the application does not have sufficient rights to write the directory specified. upon restarting the Web server. Which of the following methods would resolve the problem? A. The command does not display hidden files. Reference: Roderick W. Verifies that the package is installed correctly and reports errors. It is a security risk to have the entire web server running as root. B. Change the Web server user to 'root' so that applications run within it will run as root. Answer: B. Tobler. Upgrades the package and provides installation status. Incorrect Answers: A. Page 51 of 217 . It would need root permissions to write to the root directory. The 'e' option is used to uninstall a package. In a text file kept on a Linux file server. Set User ID (SUID) is used to run a program as the user who owns the program (usually root) rather than the user running the program. C. Smith. D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. D. it is desirable to have applications writing their error logs to the usual log file location. C. Uninstalls the package and related hidden files. where is the best location to maintain documentation of work performed on Linux servers at a site? A. Change the permission and ownerships of the application to match the user group of the Web server. Off-site at a different facility. However. In a binder in the server room. New Riders. Reference: Michael J. The application needs to run as root. The package will still be installed if no previous versions exist.

The documentation should not be kept on a computer. A user ID number that has been set to zero. Sybex Linux + Study Guide: Page 438. Smith. D. mkfs -t vfat /mnt/floppy Answer: A. mkfs /dev/fd0 B. B. Reference: Page 52 of 217 . The documentation should not be kept on a computer. For which of the following should the script check? A. D. C. Smith. The documentation should be easily accessible by the network administrators. However. Answer: A. Explanation: The mkfs (make file system) command is used to format a disk. Explanation: Intruders usually create a user account with the ID number set to zero. Answer: C. easily accessible by the network administrators. Incorrect Answers: B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. Question: 158 Which of the following would correctly format a 3. A group account with an ID of zero is a root group. Sybex Linux + Study Guide: Page 245. B. A group account of 'wheel' does not pose a security risk. it would be better to look for user accounts with an ID of zero. in case the computer fails. Explanation: The documentation should be kept in a safe place. An unusual name does not create a security risk. In a text file on the local machine where the changes were made. A group ID number that has been set to zero.5" diskette? A. A user with an unusual account name. mount -f /mnt/floppy D. /dev/fd0 is the first floppy disk on a Linux system. Incorrect Answers: A. Question: 157 A system administrator has written a script that scans the password file for "unusual" things. A user account with a user ID of zero has root privileges. Reference: Roderick W. A user with the default group of 'wheel'. in case the computer fails. Reference: Roderick W. D. fdisk /dev/fd0 C. C.

netcfg C. the syntax is incorrect. the syntax is incorrect. siginit D. then /sbin/special.). but it will only run once.sh C. What would be a solution? A. ifconfig Answer: D.m. The 5 signifies a Friday. Also. Smith. The 'at' command can schedule a program. Sybex Linux + Study Guide: Page 459-460. Question: 159 The administrator wants to use /sbin/special.sh B. Fdisk is used for partitioning a hard disk. Explanation: The ifconfig command will display detailed information about an interface. Sybex Linux + Study Guide: Page 335.sh fi " to his crontab Answer: C. D. Incorrect Answers: A. Smith. not to format a floppy disk. Reference: Roderick W.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Roderick W. Add "5 1 13 * 5 /sbin/spcial. B. C. Inside Linux: Page 408/9.sh to do a backup every Friday the 13th. The 'at' command can schedule a program. Reference: Michael J. cksum B. but it will only run once. Run at "Fri. Explanation: The crontab is used to schedule a program such as a backup program. Run at 'date | cut -d -e \f3' /sbin/special. The mount command is used to mount a drive.00 a. New Riders. The syntax is incorrect. 13" < /sbin/special. The information will include the operational status of the interfaces. Also. The 1 signifies 01:00 (1. the program will run at 01:05 (5 past 1 in the morning). D. not formatting a floppy disk. The first 5 signifies 5 minutes past the hour. You should use the msdos option. The * signifies any month. Question: 160 Which of the following commands is used to determine if network interfaces are up and running? A. Incorrect Answers: Page 53 of 217 . Vfat is the wrong file system for a floppy disk. The 13 signifies the date of the month. Tobler.sh " to his crontab D. Add "1 1 13 ** if [ 'date' == "Frid" ]. This means that if the 13th day of a month is a Friday. Incorrect Answers: B.

D. Question: 163 Under which of the following hardware upgrades would a system NOT have to be rebooted? A. to discover the incompatible device. C. Power management is more likely to cause problems. C. Netcfg is not used to determine if network interfaces are up and running. which of the following should be done? A. Shielded Twisted Pair (STP) cable uses copper wires and is therefore susceptible to electromagnetic interference. Reference: http://www. It is less susceptible to EMI than UTP (unshielded twisted pair) because the copper wires are shielded. Question: 161 Which of the following is LEAST affected by electromagnetic interference (EMI)? A. To troubleshoot this. Fiber Optic Cable B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. Shielded Twisted Pair (STP) Answer: A. you should remove all unnecessary hardware. Repartition the drive.uk/users/gorry/course/phy-pages/fibre. Replacing a PS/2 mouse. RG-68 Coaxial Cable D. B. As it uses no copper wires. D. Upgrading the CPU. Question: 162 If the Linux installation process continuously locks up. Explanation: Fiber Optic cable uses pulses of light along a glass fiber to transmit data. Incorrect Answers: A. Ensure that the network card is installed prior to the installation. it is immune to electromagnetic interference. Remove all unnecessary hardware. it is likely that a hardware device is incompatible with Linux. Adding a USB CDROM drive. Siginit is not used to determine if network interfaces are up and running. Coaxial Cable uses copper wires and is therefore susceptible to electromagnetic interference. Enable power management in the BIOS.abdn. D. B. Page 54 of 217 .ac.html Incorrect Answers: B. Explanation: If a Linux installation continuously locks up. and add the hardware one device at a time. Answer: B.erg. C. C. Repartitioning the drive will not resolve the problem. Wireless data transmission is susceptible to electromagnetic interference. B. Encrypted Wireless C. It is not used to determine if network interfaces are up and running. It is not necessary to install the network card prior to an installation. than resolve them. Cksum is used to calculate a Cyclic Redundancy Check to check a file for errors. C.

B. Explanation: One of the features of USB devices is that they are 'hot swappable'. Reference: Page 55 of 217 . Explanation: An IEEE-1394 port is a firewire port. the BIOS reads configuration information from the CMOS.apple. When the computer boots. Answer: C. Question: 164 Which of the following connectors is hot pluggable? A. A PS/2 mouse may not work if it has been replaced without rebooting the machine. B. Serial ports are not hot pluggable. Reference: Roderick W. The CPU can only be changed when the system is shut down. The BIOS and CMOS are hardware and are not related to the operating system which is software. Ultra2 SCSI ports are not hot pluggable. POST C. video and I/O boards are installed in a PC. Boot strap Answer: A. This means that you can disconnect and reconnect USB devices without needing to reboot the system. CMOS B. Parallel ports are not hot pluggable. This is a relatively new technology provide high data transfer rates and is hot pluggable. Installing additional RAM. Serial port B. Reference: http://www. Incorrect Answers: A. Ultra2 SCSI external connector Answer: C. IEEE-1394 port D. Parallel port C. Explanation: The CMOS chip is the 'configurable' part of the BIOS. which of the following allows the installed card to be integrated with the current system on a hardware level? A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. D. Sybex Linux + Study Guide: Page 402. RAM can only be installed when the system is shut down. BIOS D. D. Smith.com/firewire/ Incorrect Answers: A. Question: 165 When SCSI.

The extra chip indicates parity memory. Unregistered SDRAM memory is required Answer: B. C. the PC does not boot and beeps several times.wimsbios. Question: 166 A user has three SCSI devices (two internal and one external) connected to his computer.com/ Incorrect Answers: B. Parity memory is required C. The extra chip indicates parity memory. The technician observes that the old SIMMs use 9 chips while the new SIMMs only use 8 chips. If the driver wasn't installed. Explanation: Parity memory boards have an extra chip for parity checking. AN IRQ conflict C. What is most likely the problem? A. Reference: http://www. C. Boot Strap is the process of a computer booting up. The SCSI devices don't have separate IRQs. not Fast Page Mode memory. Sybex Linux + Study Guide: Page 32. not EDO memory. The POST (power on self test) is the process of the BIOS checking the system for installed hardware during system boot up. Incorrect Answers: B. Explanation: SCSI devices use SCSI identifiers (IDs). Question: 167 After the failed memory has been replaced. and this device and one of the internal devices do not work. D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 http://www. The SCSI controller (to which the SCSI devices are attached) uses one IRQ.html?i=113&p=6 Incorrect Answers: A. Each device must have a unique SCSI ID to function correctly. C. A driver is not installed Answer: A. D. He adds another external device. Fast Page Mode memory is required D. The BIOS cannot be directly configured. Smith. none of the two devices will work. It reads its configuration information from the CMOS. An ID conflict B. EDO memory is required B. A memory conflict is less likely than an ID conflict.com/showdoc. Reference: Roderick W. Which of the following is the most likely cause? A. The beep code indicates there is no memory. only the recently added device would not work. A memory conflict D. The previously added devices would still work.anandtech. Page 56 of 217 . If two devices have the same ID.

The power cable has not been connected properly. If the light was broken. Explanation: Inserting the ribbon cable backwards is an easy mistake to make and often causes the symptoms mentioned in this question. Floppy drive type D.computerhope. C. Mouse type B. The BIOS default would most likely have the correct size (3. The system BIOS is misconfigured. The extra chip indicates parity memory. Incorrect Answers: B. not SDRAM memory. He turns the computer on and discovers that the diskette drive light stays on all the time. Hard drive auto-detect Answer: A. it wouldn't come on at all. Twisted pair Answer: B.5 inch) configured.5" diskette drive in his desktop computer. The floppy drive type.htm Incorrect Answers: A. The light on diskette drive is broken. Question: 169 A user has just installed a new 3. What is the most likely reason the light stays on? A. (3. Page 57 of 217 . the light wouldn't come on at all. If the power cable wasn't connected.25 inch) is a common option. Explanation: The mouse type is not a common BIOS option although the PS/2 mouse PORT is often mentioned.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. Fiber optic D.com/issues/ch000278. The option to disable or enable hard drive auto detection is common. Reference: http://www. C. The ribbon cable is inserted backwards in the drive. Question: 170 Which network interface card has BNC connector on it? A. Question: 168 All of the following are common BIOS options EXCEPT A. C. The option to disable or enable parity checking is common. D. Parity/non parity C. Answer: D. B.5 inch or 5. D. The only configurable floppy drive option is the size. B. Thinnet C. IR B.

Which of the following will need to be reconfigured to get the system working after replacing the battery? A. Fiber Optic does not use BNC connectors. C. Question: 171 On a Plug-and-Play system. If the battery fails.sid7_gci211681. B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: Thinnet (otherwise known as 10Base2) uses the BNC connector. Replace the legacy devices with current Plug-and-Play devices. Incorrect Answers: A. Reserve the resources in CMOS for the legacy hardware. Smith. Data on each partition Answer: B.techtarget. MBR settings B. It is not necessary to replace the BIOS. Explanation: The resources for the legacy devices should be reserved in the CMOS. Sybex Linux + Study Guide: Page 30. Question: 172 A battery fails in a Linux workstation.. This will prevent the resources being dynamically assigned to plug and play devices. Explanation: The CMOS relies on a battery to 'remember' its configuration. Reference: http://searchnetworking. Replace the BIOS with a non-Plug-and-Play BIOS.com/sDefinition/0. POST settings D. D.pcmech.html Incorrect Answer: A. It is not necessary to enable IRQ routing in the BIOS. It is not necessary to replace the devices. Answer: C. Reference: http://www. Reference: Roderick W. some legacy hardware (non-Plug-and-Play) is required. Twisted Pair does not use BNC connectors. which would cause a resource conflict. Which of the following should be done to ensure the proper operation of all hardware on the system? A. CMOS settings C.00. Enable IRQ routing in the BIOS. D. IR (infra-red) is a wireless technology and therefore uses no connectors. C. B. C.com/show/motherboards/80/ Incorrect Answers: Page 58 of 217 . the CMOS will need to be reconfigured.

Smith. C. Question: 175 Page 59 of 217 . The data on each partition is written to the hard disk and does not rely on battery power. IRQ 5 is commonly used by sound cards. New Riders. IRQ 7 is commonly used by the parallel port. It is unlikely that a faulty CD-RW would degrade the system performance. Question: 174 A system's serial device is not operating correctly. The POST settings are in the BIOS which does not rely on battery power. Answer: D. 5 C. 4 B. Inside Linux: Page 137. 13 Answer: A. Reference: Roderick W. and CDROM drive. System performance can be improved by installing CD devices on the secondary IDE controller so that they are separate to the hard drive. Incorrect Answers: A. B. Replace the CD-RW drive. Reference: Michael J. C. COM ports 1 and 3 use IRQ 4. D. CD-R accelerator software may improve the CD-R performance. Move the CD-RW to the secondary IDE controller.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. C. but it won't improve the overall system performance. Which of the following will most likely resolve the problem? A. Moving the CD device to the secondary IDE controller will improve performance without the need for extra software. Switch the CD-RW to cable select. D. B. Using cable select will not improve system performance. Tobler. IRQ13 is used by the Math co-processor. as it is damaged. 7 D. Which of the following IRQs is likely to be conflicting and causing the problem? A. The MBR settings are written to the hard disk and do not rely on battery power. Explanation: Most systems come with two IDE controllers. D. The user then reports the system is taking longer to load applications. Incorrect Answers: B. C. The hard disk is always on the primary IDE controller. Install CD-R accelerator software. Sybex Linux + Study Guide: Page 31. Question: 173 A user adds a new CD-RW to an existing system with a diskette drive. single IDE hard disk drive. Explanation: Serial devices use COM ports.

not 2. the first troubleshooting step would be to remove the device and reinstall it. D. C. 4 C.tstc. not 4. Remove the drive and reinstall it. It may not be necessary to reboot the system. If the device worked before. Answer: C. 7 Answer: D. The SCSI controller usually uses SCSI ID 7. Incorrect Answers: A. This is usually ID 7. 2 B. Laptop PCMCIA devices are hot swappable. Reboot the system. Reinstall the driver. not 5. Page 60 of 217 . This does not need to be configured in the CMOS. Set up hot-swapping capabilities in CMOS. Network card Answer: B. The SCSI controller itself uses a SCSI ID. B. CD-ROM C. Explanation: CD-ROM devices commonly use the ATAPI interface. Video card D. Explanation: SCSI devices need separate SCSI IDs.html Incorrect Answers: A. then the driver is already installed and does not need reinstalling.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A user has just hot-swapped the CDROM with the diskette drive in his mobile system. Now the diskette drive is not responding. Question: 176 Which if the following IDs should be avoided when assigning IDs to SCSI peripherals? A.edu/database/hardware/scsi. The SCSI controller usually uses SCSI ID 7. Modem B. C. Try refitting the device first. 5 D. Reference: http://cmtunix. Which of the following actions will correct the problem? A. Question: 177 Which device commonly uses the ATAPI interface? A. Explanation: If a device doesn't work after hot plugging it into a mobile system. D. B. B. The SCSI controller usually uses SCSI ID 7.

A patch should be tested on a secondary system before installation on a production system. Video Cards commonly use the AGP interface. Apply the patch onto a secondary system to test the patch before installing it on a production machine. not the AT command Question: 179 A Linux vendor has recently come out with a necessary patch to the server software to improve security on the server. AT4323604DT Answer: C. Apply the patch immediately to the production system. You need the ATDT command. A patch may introduce errors and conflicts. but this is why should test it first on a secondary system. D. Network cards commonly use PCI interfaces. AT4323604 B. Apply the patch during business hours. Page 61 of 217 . ATM4323604 C. Never apply patches on production servers. if any. C. Reference: http://www. Smith. Incorrect Answers: A. ATDT4323604 D.option.co.za/hayesat. for updating this patch on a production system? A. not the ATAPI interface. Sybex Linux + Study Guide: Page 203. not the ATAPI interface. to validate the patch under normal system operation. Explanation: Any new software or software patch should be installed on a secondary system and thoroughly tested before installation of production systems. You need the ATDT command. Incorrect Answers: A. because security patches need to be installed right away. B. You need the ATDT command. Reference: Roderick W. Question: 178 A user believes that his telecommunications software is not dialing his modem properly. D. C. Explanation: The ATDT<number> command is used to have a modem dial a number. Sybex Linux + Study Guide: Page 24. B. because they may introduce errors and conflicts. Modems commonly use the serial interface. Which of the following AT commands can be used to have the modem dial 432-3604? A. Answer: C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Reference: Roderick W. Smith. B. Which of the following is the best practice. not the AT command. not the ATAPI interface.htm#Hayes%20AT%20Commands Incorrect Answers: A. not the ATM command D.

Sybex Linux + Study Guide: Page 613. If the output contains information about only one processor. Look in /var/log/messages Answer: D. Run cpuinfo B. Dmesg is a utility that displays the text that is displayed during system startup. B. Check /var/log/messages for errors. How could this be verified? A. Error messages are not written to this file or directory.cpan. Dmesg displays the text that was displayed when the system booted. C. Explanation: Cpuinfo is a utility that displays information about all running processors on a system. Run dmesg to review the log file. D. C. Rather than overwriting the older versions. Reference: Roderick W. D. Run uptime C. Question: 180 A Linux system crashes every day at the same time and needs to be rebooted. the administrator suspects that only one processor initialized successfully during the boot process. Question: 181 After installing Linux onto a dual-processor machine. Which of the following would provide evidence of what was happening on the system at that time? A. Reference: http://www. Explanation: Most applications write error messages to files in the /var/log/messages directory. Ps lists the running processes. A non-functional processor would generate any error messages in the error logs. Answer: A. they keep older versions Page 62 of 217 . not the processors. Incorrect Answers: A. Therefore. You should look here to see if you can discover what is causing the system to crash. then only one processor is working.5. This will not contain any information about a non-functional processor. Security patches should be installed as soon as possible. Run dmesg B.readme Incorrect Answers: B. Run ps to see if both CPUs appear. C. Question: 182 A system has a utility that is regularly updated with new versions.org/modules/by-category/04_Operating_System_Interfaces/Linux/Linux-Cpuinfo1. You need find out what caused the system to crash before the reboot was necessary. they need to be retained for testing purposes. Smith. Look in /etc/shutdown D. Uptime is a utility that displays how long the system has been running for.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. but not before testing on a secondary system.

Reference: Roderick W. might have links to the original program name. Incorrect Answers: B. Smith. The PS command does not display the load average for the processor. A high ID would not slow the machine. B. The latest version of the program should be renamed 'utility' because other files that the program uses. C. A copy of the latest version of the program should not be renamed 'utility' because other files that the program uses. A high process ID.5 What is the best way the system can be set up so that users cam simply type "utility" to run the latest version of the application? A. B. A high CPU time. Incorrect Answers: A. Reboot the server. Answer: C. Sybex Linux + Study Guide: Page 514. Sybex Linux + Study Guide: Page 134. Question: 184 When dial-up users are able to connect to the dial-in Linux server but are unable to authenticate. The symbolic link needs to point to the latest version of the program. D. C. The process ID is just an identifier for the process.lnk". Explanation: The PS command is used to display information about the running processes.3 utility1. Move the latest version of the utility to "utility". Smith. D. This can usually be fixed by restarting the process. C. Make a symbolic link "utility" to the latest version. This means that a high percentage of the processor time is spent trying to run the process. Reference: Roderick W. What information from the ps command would suggest that a process is problematic and must be killed? A. Page 63 of 217 . A symbolic link named utility will open the file (program/utility) that the link points to. D. Question: 183 A machine that usually executes its tasks very quickly becomes remarkably slow. B. Explanation: A symbolic link is like a shortcut. A high load average. might have links to the original program name. A faulty process can be recognized by having a high CPU time.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 in the following format utility1.4 utility1. D. which of the following should be done? A. Copy the latest version of the utility to "utility". The PS command does not display information about the memory. when a user types 'utililty'. Make a symbolic link from the latest version to "utility. Answer: A. A high memory percentage.

2.2.com/pub/redhat/linux/7. Explanation: You can download a rescue/boot disk from the distributions Website. the users would not be able to dial in. Return to the Website to receive an uncorrupted . While installing the file the following error is displayed: failed to open /var/lib/rpm/packages.rpm. Question: 185 The system administrator is asked to install a file called zope-2. to enable its installation. you can download Redhat Linux boot disk images from: ftp://ftp. Change ownership of file to 'root' C. Check spooler for errors. Check that RADIUS is running. If RAS wasn't running. In /root C.redhat. C.org D. You cannot bypass a 'permission denied' error message. It is not necessary to reboot the server. just start the RADIUS service.html Incorrect Answers: A. From linuxdocs. Reference: http://www.5-0" as root.2. D. At the distribution's Website.5-0" to bypass the error.5-0. The spooler is for printing. Explanation: You must be logged in as root to install a program. C. not authentication. Answer: D. The administrator downloads the file and attempts to install it. Answer: A. Run "rpm -i zope-2. The system was able to read the permissions. Run "rpm -i --nodeps zope-2. In /boot B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B. which means the file is not corrupted. C.3/en/os/i386/images/ Page 64 of 217 . Explanation: RADIUS stands for Remote Authentication Dial In User Service. For example. Check that RAS is running. D. Where could a rescue/boot disk be found? A. Question: 186 A Linux machine is not booting after a power outage. B.org/software/radius/radius.gnu.rpm What has to be done before the program will work? A. Answer: D. D. The file does not need to be owned by root.rpm: Permission denied error: cannot open /var/lib/rpm/packages. Incorrect Answers: B.rpm file. B. No rescue/boot disk is readily available. It is a service that is used to authenticate dial in users.

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

Incorrect Answers: A. There are no boot disk images in /boot. B. There are no boot disk images in /root. C. Linuxdocs.org contains documentation, not boot disk images. Question: 187 Why is "netstat -nr" used in substitution of the route command when a network connection is not functioning correctly? A. "netstat -nr" displays the routing table without performing reverse name lookup. B. Route requests the network driver for data, but "netstat -nr" will display the kernel's routing table. C. The route command can be used if the network is functional. The "netstat -nr" displays only the local machine. D. Route will attempt to contact and verify the connections to each host in the routing table using ping. If the network fails, route will stop responding. Answer: C. Explanation: The Route command is used to display the routing table. If the network is not functional, the routing table will only contain static routes; it will not contain any dynamic routes. The netstat command displays information about the local machine whether the network is functional or not. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 373/4. Incorrect Answers: A. Netstat is used rather than route because netstat displays information about the local machine. B. Netstat is used rather than route because netstat displays information about the local machine. D. Route does not attempt to contact and verify the connections to each host. Question: 188 In order to control runaway processes, an administrator creates a cron job. Which of the following commands should be run so that he can scan the logs later? A. ps B. sar C. top D. tail Answer: C. Explanation: A 'runaway' process is a process that is using a high amount of CPU time. The 'top' command displays the processes that use the highest amount of CPU time. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 668. Incorrect Answers: A. The ps command displays all processes. We just need the processes with the highest amount of CPU time.
Page 65 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

B. There is no sar command. C. The tail command displays the processes with the lowest amount of CPU time. Question: 189 After setting up a cron job to backup a system to tape, the first few backups on the tape cartridge are successful. They then fail, reporting the "device is full." What could be the cause of the problems? A. Tapes can only be used once. B. The tape is not being erased. C. The tape drive needs to be replaced. D. Incremental backups need to be used. Answer: B. Explanation: If you're using a single tape to run scheduled backups, then the cron job will need to be configured to erase the tape before performing the backup. Incorrect Answers: A. Tapes can be used many times. C. It is unlikely that the tape drive is faulty and therefore does not need to be replaced. D. Incremental backups back up only the files that have changed since the last backup. These backups use less tape space but the tape will eventually fill up if it isn't erased. Question: 190 A new user has been issued a Linux system that automatically boots to an X login, but would rather have the system automatically boot to the console login. How should the system be configured to accommodate the user? A. By typing "init 3" in an xterm. B. By running the Xbootmgr utility. C. By editing /etc/lilo.conf and adding the line: boot = console D. By changing the line in /etc/inittab that reads: id :5:initdefault: to read: id:3:initdefault: Answer: D. Explanation: The inittab file specifies the default runlevel for the machine. Run level 5 will automatically boot to an X login. Runlevel 3 will boot to a console login. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 410, 399. Incorrect Answers: A. Init 3 will change the runlevel to runlevel 3, but the default boot runlevel won't be changed. B. Xbootmgr will not change the default runlevel of the machine. D. The is an incorrect use of the boot command in a lilo.conf file. Question: 191

Page 66 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

A user complains that they can send and receive mail on the Internet, but cannot browse the Web. They have tried using different Web browsers in X. Working offline is disabled. What is most likely to be the problem? A. The user is not typing the Web address correctly. B. Web support was not added during the initial installation. C. X dropped Web access to the browser and needs to be restarted. D. There is a proxy sever that the browsers have not been configured to use. Answer: D. Explanation: If you have a proxy server configured on the network, the client computers need to be configured to use it to access the internet. Reference: http://www.squid-cache.org/ Incorrect Answers: A. An incorrect web address would return a page not found error or a different website. B. Web support is added by default in most installations. C. This is not something that X can do. Question: 192 A user-defined cronjob is configured incorrectly and is slowing down a server. What is the best way to address this issue? A. Use "cron-d*" to delete each user's cron jobs. B. Use "userdel <user>" to delete the user to prevent additional cron jobs. C. Use "crontab -u <user> -l" for each user to find out who has the incorrect crontab. D. Prevent cron from launching any additional processes by using "killall -9 crond". Answer: C. Explanation: You need to find out which users' cron job is causing the problem and stop the cron job. Reference: http://www.oreillynet.com/linux/cmd/c/crontab.html Incorrect Answers: A. It is not necessary to delete all the users' cron jobs. B. It is not necessary to delete any user accounts. D. Cron is already running a troublesome process. Killing any additional processes won't help. Question: 193 Which of the following tasks cannot be accomplished with the touch command? A. Create a new file. B. Change a file's modification time. C. Change a file's access time. D. Change a file's creation time. Answer: D.

Page 67 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

Explanation: The touch command is used to display information about a file, including its modification and last access times. If the file doesn't exist, touch will create it. It cannot modify a file's creation time. Reference: http://www.oreillynet.com/linux/cmd/t/touch.html Incorrect Answers: A. If a file doesn't exist, touch can create it. B. You can change a files modification time with the touch command. C. You can modify a files access time with the touch command. Question: 194 A site administrator instructs the technician to install Linux as a secondary OS on an existing workstation. He wants to use the boot loader of the primary OS. When requested where to place LILO, the technician should select which location? A. BIOS B. /etc/disktab C. Master boot record D. Partition superblock Answer: B. Explanation: The default location for a Linux boot loader is in the Master Boot Record. However, if you want to use the boot loader of another operating system, you'll need to put the Linux boot loader into a directory in a Linux partition such as /etc/disktab. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 213. Incorrect Answers: A. You cannot put a Linux boot loader into the BIOS. C. If you want to use the boot loader of another operating system, you'll need to put the Linux boot loader into a directory in a Linux partition such as /etc/disktab. D. You cannot put a Linux boot loader into the partition superblock. Question: 195 A network administrator attempted to configure the Ethernet interface. He issued the insmod command along with the driver's object file. However, insmod reports errors about unresolved symbols. Which of the following is the cause of the problem? A. A driver of that type has already been installed. B. The latest version of insmod is not installed. C. The compiled driver is incompatible with the kernel. D. The module is designed for a device of another type. Answer: C. Explanation: Unresolved symbol errors are usually caused by attempting to install a module/driver which is incompatible with the kernel. Reference:
Page 68 of 217

Incorrect Answers: B. Which protocol must be installed on the BOOTP server to communicate with the client terminal? A. you need to reduce the size of the FAT32 partition to free up enough space to create a Linux partition. The device just wouldn't work. The module would still load if it were designed for another device. Run format Answer: A.html Incorrect Answers: A. SMB B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Roderick W. commonly used with diskless workstations. Incorrect Answers: A. Reference: http://www. C. Explanation: BootP is an IP protocol. It is not necessary to have the latest version on insmod installed. Question: 196 A computer has a FAT32 partition that takes up the entire 16 GB hard driver. Sybex Linux + Study Guide: Page 571. D. Page 69 of 217 . D. not resize it. OSPF D. B. Run fdisk D. Run rsize C. Question: 197 A client terminal requires the BOOTP protocol in order to access the server. This would not cause an unresolved symbol error. Explanation: To install Linux. IGRP is a routing protocol. What is the best way to install Linux without removing the other operating system? A. It is not used with BootP. It is not used with BootP. It is not used with BootP. Rsize is the incorrect command. Another operating system is currently installed. Format will erase everything on the partition. Smith. TCP/IP Answer: D. C. Reference: Roderick W.com/TERM/B/BOOTP. Smith. Run FIPS B. OSPF is a routing protocol.webopedia. FIPS is a utility that can resize partitions without losing data. B. but only uses 8 GB of the partition. Fdisk creates partitions but it cannot resize them. IGRP C. Sybex Linux + Study Guide: Page 43. SMB is a NetBIOS protocol used for communication with Windows computers.

D.conf file won't help because the program doesn't write to a log file. /var/log/messages D. Which of the following would capture the output for evolution? A. Sybex Linux + Study Guide: Page 656. This is not the default location for application error messages. 3 Answer: B Page 70 of 217 . Question: 199 A new shell command is installed and does not perform correctly.conf C. you could read the output by scrolling up the window.log B. Running the command as a daemon would not capture the output. 1 C. Sybex Linux + Study Guide: Page 613. Incorrect Answers: A. Answer: D. /var/log/dmesg C. Add redirection to the command line. This is not the default location for application error messages. Smith. B. Run the command in the background.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 198 Where is the first place to look for error messages while installing and testing an application? A. It generates too much diagnostic output to read on the screen and does not write to a log file. 0 B. /tmp/boot. /var/log/kernel/errors Answer: C. Reference: Roderick W. B. B. This is not the default location for application error messages. Smith. 2 D. Make the changes to /etc/syslog. Reference: Roderick W. Running the command in the background would not capture the output. Making changes to the syslog. Question: 200 Which runlevel only grants root access? A. D. Run the command as a daemon. Incorrect Answers: A. Explanation: By redirecting the output to a command line in a console. C. Explanation: Most applications write messages to error logs stored within /var/log/messages.

Page 71 of 217 . Question: 201 A new employee having a problem with account login has the following enter in the /etc/passwd file: User1:*:51:501:John Doe:/home/user1:/bin/bash What is wrong with this entry in the /etc/passwd file? A. rpm -m <package name> D. Sybex Linux + Study Guide: Page 178. The user ID is valid. Smith. Smith. Reference: Roderick W. D. Tobler. Question: 202 What command is used to remove an rpm package from Linux? A. The User ID and Group ID do not have to be the same. This means that the account is locked. The UID and GID must match. D. rpm --remove <package name> Answer: A. Reference: Roderick W. rm -rf <package name> C. Incorrect Answers: A. This account has no password as indicated by the '*'. Reference: Michael J. Explanation: The rpm -e <package name> command is used to remove an rpm package.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: Runlevel 1 is 'single user maintenance mode'. Runlevel 2 is a multiuser mode in which any user can log in. The account is locked. Sybex Linux + Study Guide: Page 410. New Riders. Runlevel 2 is a multiuser mode in which any user can log in. (note: This is not the login name). rpm -e <package name> B. Answer: B. C. B. C. Spaces are permitted between the first and last name. In the mode. C. only the root user can log in to the system. Incorrect Answers: A. Inside Linux: Page 397. Explanation: The second field is the password field. Runlevel 0 shuts down the computer. Spaces are not permitted between the first and last name. D. The UID is not valid.

Audrey@comptia.org and does not keep a local copy.audrey@comptia. Question: 204 The following is an example of a ". Explanation: A . /Audrey will keep a copy in a directory called /Audrey. Reference: Michael J. Video RAM C. The refresh rate must be configured. This is the command used to delete a directory.org Which of the following best describes what the mail handler will do when user "audrey" receives mail? A. Reference: Bryan Costales. It runs a program audrey that is found in the root directory and forwards the mail to audrey@comptia. all of the following must be configured correctly EXCEPT A. Resolution capability Answer: D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Incorrect Answers: B. New Riders. O-Reilly Press.foward file is used to tell an email client what to do with received email. separated by commas. Incorrect Answers: Page 72 of 217 . C. C. It saves a copy of the mail locally and forwards a copy of the mail to audrey@comptia. It forwards a copy to comptia.forward" file found in user Audrey's home directory.org. However. There is no -m option in the rpm program. C. /audrey. this setting when incorrectly configured would not damage a monitor.org. Tobler. RAMDAC B. There is no --remove option in the rpm program. Question: 203 In order to prevent monitor damage when configuring X. The Video RAM must be configured. Incorrect Answers: A. Sendmail. B. B. You can have multiple entries in the file. D. Page 429. Answer: B. The RAMDAC must be configured.org will forward a copy of the email to that address. It runs a program called audrey that is found in the root directory and forwards the program's results to comptia. D.org. You would need to delete every file installed by the package if you were to use this command. Explanation: The resolution capability is a graphics card setting. Inside Linux: Page 135. Refresh rate D.

~/. Reference: Roderick W./etc/profile. Sybex Linux + Study Guide: Page 400.d/inittab D.bash_login. not a Linux boot loader. ~/. It does not run a program called Audrey. not a Linux boot loader. /usr/local/etc/getty. /etc/rc. ~/.EXE C. ~/. Incorrect Answers: B. Disk Druid D.~/. ~/.bash_profile.bash_profile.conf Answer: A.bash_profile Page 73 of 217 . /etc/termcap does not contain configuration information for the various runlevels.d/inittab does not contain configuration information for the various runlevels. Sybex Linux + Study Guide: Page 490. Question: 205 What file should be edited to add two additional gettys to runlevel 3? A. in which of the following sequences are the scripts sourced? A .profile. Smith. ~/. /etc/profile. Minix is an old UNIX operating system.dlinit. /etc/inittab B. C.bash_login.conf does not contain configuration information for the various runlevels. Smith.profile C .EXE Answer: D. Reference: Roderick W.bash_login. Question: 206 Which of the following programs can be reconfigured to boot Linux? A. LOADLIN.dlinit. LOADLIN. C. Explanation: There are various boot loaders for Linux such as LILO. /etc/profile D . not a Linux boot loader. It does not run a program called Audrey.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. It will save a copy in the /Audrey directory.bash_profile.~/. ~/.EXE is a DOS program that can load Linux. FIPS. Minix B.profile B . C. Explanation: The /etc/inittab file contains the default configuration information for the various runlevels. Grub and LOADLIN. Question: 207 When BASH is invoked as an interactive login shell. /etc/termcap C. B. D. ~/. ~/. Fips is a partition resizing utility. /etc/rc./etc/profile.EXE.bash_login. ~/.profile. Disk Druid is a hard disk partitioning utility. /usr/local/etc/getty. D. Incorrect Answers: A.

C. Broadcast: 192.1.0. This is not the correct file to configure X. rm module C.1.168.1.0 C.168.255 as the broadcast address. Explanation: The first three octets of a Class C address are the network address. /uninstall <module name> Page 74 of 217 . /root/Xwindows/Xconf Answer: C. Network: 192.1. These are incorrect network and broadcast addresses.1. /etc/X11/XF86Config D.0. B. rm -rf <module name> D.168. These are incorrect network and broadcast addresses. Incorrect Answers: A.1.255 Answer: D. This is not the correct file to configure X. Question: 210 What command is used to remove a kernel module? A. The network address has a zero as the host portion (e.168.1. Broadcast: 192.1.0.0. Network: 192.2 B. Question: 209 A new video card is added to a Linux workstation. /usr/conf/Xconfig B.2 What are the default network and broadcast addresses? A.0.168.168. Incorrect Answers: A. Explanation: XF86Config is the configuration file for X. Network: 192. 192. The broadcast address has 255 as the host portion (255 = all 1s in binary). Reference: Roderick W. This is not the correct file to configure X. Sybex Linux + Study Guide: Page 124. The last octet is the host portion of the address.168.0.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: B Question: 208 A server has the following Class C IP address: 192.g.0.0 D. Smith. These are incorrect network and broadcast addresses. It resides in the /etc/X11 directory.0. This gives us 192. Broadcast: 192. /etc/X11R6/Xconfig C. B. Network: 192.168.1.1.0). rmmod B. Broadcast: 192. D. Which of the following files is used to configure X? A.

Is the printer ready to use? Page 75 of 217 .Remove jsmith from the group jsmith Answer: C Question: 212 Which of the following contains system user default configuration files and directories? A.Remove jsmith from the group belso D . D.Add jsmith to the group root B . The command rm module would delete a file called module from the current directory. Question: 211 User jsmith needs read and write access to the file named employees but should have no access to the file named alary User jsmith is member of the groups smith and elso? -rw-rw---.1 salary belso 4230 Jun 18 18:01 salary Which of the following should be done to accomplish the goal? A . The default user configuration files are not stored in the /etc/user.Remove jsmith to the group salary C . Reference: Roderick W. /usr/config C. The default user configuration files are not stored in the /usr/local/bin directory. C.conf file.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: A. Explanation: The default configuration files for user accounts are in /etc/skel. Question: 213 A new printer has been installed and the printcap file has been edited. C. Incorrect Answers: B. These settings are copied when a user account is first created. D. The rm -rf command would delete all files in a directory called <module name>. The default user configuration files are not stored in the /usr/config directory. /usr/local/bin D. Incorrect Answers: B. Smith. Reference: Roderick W. /etc/user. Sybex Linux + Study Guide: Page 260.1 jsmith root 113 Jun 16 12:59 employees -rw-r---. This is a non-existent command. Sybex Linux + Study Guide: Page 574. /etc/skel B. Explanation: The 'rmmod' (remove module) command is the correct command to remove a module.conf Answer: A. Smith.

D. B. Use ping. D. UDP C. SNMP Answer: A. C. C. because the printer configuration files are read every time the printer spool is used. Yes. C. Explanation: Page 76 of 217 . because the printer daemon must be restarted. Contact the Internet Service Provider (ISP). because there is also a spool daemon that will need to be restarted. SNMP is not used to connect to an ISP. Incorrect Answers: B. D. Explanation: PPP (point-to-point) protocol is the protocol used to connect to an ISP (Internet Service Provider). Question: 215 An Internet Web server is being installed. C. Incorrect Answers: B. Explanation: After making changes to the printcap file. There isn't a separate spool daemon that needs to be restarted. No. Use netstat. The printer is not ready for use without restarting the printer daemon. D. Smith. PPP B. Yes. Answer: A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. Sybex Linux + Study Guide: Page 339. What is the proper method to obtain a valid Internet IP address? A. Reference: Roderick W. because it is necessary to run the program called printcap which creates a separate file used by the printer daemon. No. UUCP is not used to connect to an ISP. No DHCP server is available. you need to restart the printer daemon to activate the changes. Reference: Roderick W. Question: 214 Which of the following protocols is used while configuring a workstation to dial into and connect to a new ISP? A. Smith. Answer: D. B. Use nslookup. UDP is not used to connect to an ISP. The printer is not ready for use without restarting the printer daemon. UUCP D. Sybex Linux + Study Guide: Page 550.

C. Document all configuration settings used during the installation. B. Incorrect Answers: A. Use default settings during the installation and make custom changes after the operating system is running and validated. Apply the latest patches and updates to the operating system and applications. D. Smith. The SCSI ID is set incorrectly. but this is not required and is not the most important 'best practice'. but documentation is more important. C. and applications. This will make it easier to troubleshoot any problems that may occur in the future. All of the following are possible reasons EXCEPT A. Question: 217 A user has just connected a SCSI scanner device to his computer. Sybex Linux + Study Guide: Page 438. Answer: D. They use SCSI IDs to differentiate between devices. Applying the latest patches is important. B. but documentation is more important. not to obtain an IP address. B. Incorrect Answers: B. Reference: Roderick W. There is an IRQ conflict between the scanner and another device. Explanation: SCSI devices don't use IRQs. Sybex Linux + Study Guide: Page 346. C. it is good practice to document all configuration settings used during the installation. utilities. Sybex Linux + Study Guide: Page 565. Use a single distribution for the operating system. the scanner cannot be correctly used by the software. Page 77 of 217 . Netstat is used to troubleshoot network connectivity. Ping is used to test IP connectivity. D. Reference: Roderick W. Question: 216 Which of the following tasks is the most important best practice when performing a new installation of Linux for a customer? A. The scanner device is damaged. Answer: A. The last device is not terminated. you'll need to contact the Internet Service Provider to find out what IP address to assign to the Web server.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 When installing an Internet Web server. not to obtain an IP address. Only the SCSI controller to which the SCSI devices connect uses an IRQ. Smith. Reference: Roderick W. Smith. C. not to obtain an IP address. Using a single distribution is a good idea. Explanation: When installing Linux for a customer. D. Using default settings may make the installation easier. Nslookup is used to test DNS. After installing the vendor's drivers.

This is known as EMI (Electro Magnetic Interference). EMI may occur. B. if it was close to a power cable. Explanation: All power cables produce an electro magnetic field around them. Jabber can be caused by a faulty network card. This magnetic field can interfere with data traveling along a network cable if the network cable is close to the power cable. Crosstalk can occur when network cables are close together.kemcointernational. This is not supported by Enhanced Parallel Ports.htm Incorrect Answers: B. Daisy chaining is support by both types of parallel port.com/newcoatings.fapo. B. Direct memory access (DMA) capability. C. It is possible that the SCSI ID is not set correctly. C. C. B. Omni-directional communication is support by both types of parallel port.com/ecpmode. Power surges would not occur on a network cable. It is possible that the scanner is damaged. Answer: D. Question: 220 Page 78 of 217 . Answer: A. B. Explanation: Extended Capabilities Ports support direct memory access (DMA). D. Jabber may occur. It is possible that the last SCSI device on the SCSI chain is not terminated. D. Question: 218 What may happen if a network cable and a power cable are too close together? A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Incorrect Answers: A. It is not caused by a power cable.htm Incorrect Answers: A. D. Crosstalk may occur. Power surges may occur on the network cable. C. Omni-directional communication. Bi-directional communication is support by both types of parallel port. Bi-directional communication. not by a power cable. Question: 219 What is the advantage of using an extended capabilities port (ECP) over an enhanced parallel port (EPP)? A. Reference: http://www. C. Reference: http://www. Daisy chaining capability.

ATA devices do not need to be set up with a configuration diskette. Tape drive D. physically connected to the ATA controller and power supply. Reference: Roderick W. not the PC. Ensure that the humidity is below 5%. What should he do before beginning the work? A. The CMOS setup is set to ignore all ATA devices. All modern BIOSs support ATA devices. and jumpered correctly. Explanation: ATA devices are usually auto-detected by the CMOS during system boot up. it is important to ground yourself to prevent static electricity shocks which can destroy PC components. He verified that the devices were cabled properly. You don't need to remove the CMOS battery to change the processor. Properly ground himself. As all the devices are correctly fitted. Scanner B. The BIOS does not appear to support ATA devices. It is not necessary to ensure that the humidity is below 5%. Page 79 of 217 . Printer C. No PC can support four ATA devices. Answer: B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A technician booted a PC and noted that none of the four ATA devices were detected. Sybex Linux + Study Guide: Page 563/4. this is the most likely cause of the problem. Properly ground the PC. C. C. Incorrect Answers: A. ATA devices have not been set up with the configuration diskette. All modern PCs can support at least four ATA devices. D. However. Smith. Answer: C. Sybex Linux + Study Guide: Page 31. You should ground yourself. Smith. Which of the following is the most likely problem? A. Reference: Roderick W. Question: 222 Enabling Init13h support on a SCSI controller card enables use of which of the following devices? A. B. B. Question: 221 A technician wants to replace a system processor. D. C. B. this can be disabled. Hard drive Answer: D. Incorrect Answers: A. Remove the CMOS battery. D. A common way to do this is to wear a strap that fits to your wrist and connects to the metal case of the computer. Explanation: When working with components in a PC. D.

Explanation: An ATA-66 hard drive can run on a UDMA-33 controller. Which of the following has most likely caused this? A. Sybex Linux + Study Guide: Page 30-31. Explanation: It is most likely that the SCSI bus is incorrectly terminated. Install the hard drive normally. The cable is over the 2-foot limit for the type controller. Smith. Smith. B. D. It is not necessary to flash the BIOS. Reconfigure the jumper settings on the motherboard. C. It is possible that the bus was terminated at the device before the unrecognized device. It is not necessary to reconfigure the jumper settings on the motherboard. External SCSI devices are not supported by Linux. You don't need more than one device on a SCSI chain for proper SCSI operation. Reference: Roderick W. D. C. Init13h support enables the use of a SCSI hard disk. Question: 224 A single SCSI device is not recognized during SCSI BIOS initialization. The SCSI bus is not properly terminated. It is not necessary to install a new controller. An ATA-66 controller must be installed. Incorrect Answers: A. you need to ensure that Init13h support is enabled on the SCSI controller. Init13h support enables the use of a SCSI hard disk. Sybex Linux + Study Guide: Page 579. Question: 223 How can an ATA-66 hard drive be utilized with an UDMA-33 controller? A. More than one device is required for proper SCSI operation. B. D. not a tape drive. C. Answer: A. Question: 225 Page 80 of 217 . B. D. Incorrect Answer: B. not a printer. External SCSI devices are supported by Linux. Reference: Roderick W.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: To use a SCSI hard disk. C. Answer: B. C. Flash the BIOS. not a scanner. Init13h support enables the use of a SCSI hard disk. Incorrect Answers: A. There is no 2 foot limit on a SCSI chain.

A 32-bit address that is often associated with a logical name. The 32 bit address is the IP address. The MAC address is unrelated to IPSEC. The encryption key used for IPSEC. It may not be necessary to replace the hard drive.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 What is the Media Access Control (MAC) address of an Ethernet interface? A. Defrag does not repair bad sectors and Scandisk is a Windows utility. Explanation: Every network card has a 96 bit unique identifier 'burned' into the card. If the PC failed to boot to due a bad hard disk. Replace the defective HDD and reload the system. The 48 bits signify the vendor of the card and the last 48 bits are unique for every card sold by the vendor. Incorrect Answers: A. Which is the first action to take? A. Run the manufacturer's Diagnostic Utility. The MAC address is a hardware address. Explanation: The 100 in 100BaseTX stands for 100 Mbps. Incorrect Answers: A. C. C. B. Question: 226 After having worked for several months. D. not the MAC address. Sybex Linux + Study Guide: Page 327. 200 Mbps Answer: C. a PC fails to boot and indicates that the HDD has bad sectors. it will fail again if you try to reboot. 50 Mbps C. Run Scandisk and Defrag to repair the damaged sectors. D. B. C. Page 81 of 217 . 100 Mbps D. Question: 227 What is the maximum bandwidth of 100BaseTX in half-duplex mode? A. C. Explanation: The best course of action would be to test the hard drive with the manufacturer's diagnostic utility to confirm that the hard disk has bad sectors. Answer: B. this speed is doubled. A hexadecimal number that makes a network interface card unique. An identifier used when forwarding packets between routers. Routers use software addresses such a IP addresses. B. Answer: D. 10 Mbps B. Reference: Roderick W. Smith. D. Reboot the system to remove the message. The 96 bit number is usually displayed as a hexadecimal number. In full duplex mode.

Explanation: The exhibit shows a PCMCIA card. The technician fixes the BIOS settings and the problem is solved. Sybex Linux + Study Guide: Page 589.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Reference: http://www. The 100 in 100BaseTX stands for 100 Mbps. C. the system reports the same configuration error.com/wiki/100baseTX Incorrect Answers: A. These are commonly used in laptops. in which type of system would the device most commonly be used? A. Mobile workstation. This is not a network firewall. The 100 in 100BaseTX stands for 100 Mbps. Reference: Roderick W. Stand-alone server.wikipedia. B. After a cold reboot. Network firewall. 200Mbps can be achieved in full duplex mode. Incorrect Answers: A. Smith. The 100 in 100BaseTX stands for 100 Mbps. This is not a network switch. Question: 228 Exhibit: Based on the exhibit. D. This is not a stand-alone (or any other) server. Question: 229 During boot. D. the system reports a configuration error. not 50. B. Network switch. B. C. Answer: D. What is the most likely problem? Page 82 of 217 . not 10. The CMOS battery tests good.

Explanation: In digital electronic systems. The BIOS reads the information in the CMOS during boot up. Error correction is the process of detecting bit errors and correcting them and can be done in software or hardware. component failures. D. D.com/mnecctek/faqs.aol. poor connections. ECC C. not startup problems. Smith. Taken from ECC Tech http://members.html Incorrect Answers: A. Question: 231 What AT command is used to reset a modem? A. EDO RAM does not detect errors. Explanation: When configuring the BIOS.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. Question: 230 Which type of memory not only detects. B. deterioration due to age. RAMDAC is used with video adapters and does not perform error checking. RAMDAC Answer: B. For high data rates. This can be caused by media defects. Bad or missing command interpreter. C. A bad command interpreter would cause problems when running programs. EDO B. Answer: B. there is always some chance that a mistake can be made. C. ATX B. C. Sybex Linux + Study Guide: Page 12. but also corrects single-bit errors? A. information is represented in binary format (1's and 0's). and other factors. When a bit is mistakenly interpreted. you are actually configuring the CMOS. a bit error has occurred. Therefore. Bad system memory. ATDT Page 83 of 217 . The CMOS is remembering the configuration settings and the battery is good. Bad system board. D. electronic noise. When binary information is passed from one point to another. The fact that you received the same error after configuring the CMOS suggests that the BIOS was able to read the CMOS. the BIOS chip is functional. error correction must be done in special-purpose hardware because software is too slow. Bad BIOS chip. which suggest a bad system board (motherboard). ATZ C. Reference: Roderick W. a 1 interpreted as a 0 or a 0 taken to be a 1. Parity D. Incorrect Answers: A. The system memory (RAM) is unrelated to the BIOS or CMOS. ECC Parity in itself does not correct errors.

6 D.co. echo bsmith:x:502:502:555-1234:/home/chris:/bin/bash> /etc/passwd Answer: A. useradd -u bsmith -c 555-1234 D. 8 Answer: C. IRQ 0 is used by the system timer.oreillynet.com/linux/cmd/u/usermod. Explanation: Floppy disk drive controllers commonly use IRQ 6. not the FDD controller. Question: 233 What command would allow an administrator to add an existing user's phone number to the system as a comment? A.option.za/hayesat. The ATDT command does not reset a modem. Reference: Roderick W. D. B. Reference: http://www. 2 C. Question: 232 Which IRQ is used by most FDD controllers? A.html Page 84 of 217 . The ATX command does not reset a modem.1234 C. usermod -c 555-1234 bsmith B. Reference: http://www. IRQ 8 is available for use by a device added to the system. The ATM0 command does not reset a modem. Smith. The comment should be followed by the username of the account that you are modifying. Sybex Linux + Study Guide: Page 565. Incorrect Answers: A. C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. Explanation: The ATZ command is the correct command to reset a modem. 0 B. D. modinfo -u bsmith 555. The -c option allows you to add a comment. ATM0 Answer: B. IRQ 2 is not used by any system devices but is used to enable the use of extra IRQs. Explanation: The usermod command is used to modify a user's settings.htm#Hayes%20AT%20Commands Incorrect Answers: A.

then adduser to create the user accounts. The kernel is not typically located in the /root directory. not the 'users' group. Modinfo is the wrong command to modify a user account. Explanation: The /bin directory typically contains the binary files used by the system. What method would be used to accomplish these goals? A. D. C. then edit the /etc/passwd file to change each users GID. Question: 236 Page 85 of 217 . /root Answer: A. edit the /etc/group file and include all the users to the 'users' group. Echo is the wrong command to modify a user account. Reference: Roderick W. C. As root. The users that require access to the files should be placed into a separate group. Answer: D. Question: 234 A group of users would like accounts created for them. Sybex Linux + Study Guide: Page 169. run the adduser command to create the users' accounts. As root. D. C. /dev C. The group must be created before the user accounts. You need to run the groupadd command to create a group. C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Incorrect Answers: B. Smith. Reference: Roderick W. /bin B. Smith. This includes the kernel. As root. where is the compiled kernel typically located? A. run the adduser command to create the shared group. /boot D. They want to access a particular application on the server. The kernel is not typically located in the /dev directory. As root. and then use the adduser command to create the user accounts. Sybex Linux + Study Guide: Page 270. Incorrect Answers: A. Incorrect Answers: B. Explanation: The best way to enable users to share files is to put the users into a shared group. You need to create a shared group before you can add the users to it. The group requires sharing the files created using the application. B. The kernel is not typically located in the /boot directory. Useradd is the wrong command to modify a user account. D. Question: 235 On a Linux system. B. run the groupadd command to create the shared group.

Answer: A.uk/is/selfhelp/documentation/vi-r2/vi-r2.oreillynet. The -rf options make the command recursive and forceful.ac. The df command reports the amount of free disk space. This is the incorrect command to exit Vi.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Which of the following is the most dangerous command to run as root at the root prompt? A. Reference: http://www. :QQ D. mount -u /floppy C. you would use the :q! command. D. D. Reference: http://www. This means that the contents of any subdirectories will be deleted without giving any confirmation messages. B. Esc-q Answer: B. C. Page 86 of 217 . The unmount command unmounts a disk drive or remote share. This is not dangerous. fsck C. unmount /dev/floppy. D. This is the incorrect command to exit Vi. df* B. Question: 238 A user has just completed an important document. umount /floppy B. This command when run from the root prompt will effectively delete every file on the system. :q! C. Explanation: To exit Vi without saving your changes. This is the incorrect command to exit Vi. How should the user unmount the diskette that is mounted on /floppy to ensure that the data is saved on the disk? A. Question: 237 What command in vi quits without saving changes? A. This is not dangerous. rm-rf* D. and wishes to save it to his diskette drive and remove the disk. This is not dangerous. The fsck command checks the file system for errors. :ZZ B. Explanation: The rm command is used to delete files or directory. Simply eject the disk and the system will unmount the disk.com/linux/cmd/r/rm.html Incorrect Answers: A. unmount -a Answer: C.bris.htm Incorrect Answers: A.

Reference: Michael J. and display them one screen at a time. Reference: Roderick W. Smith. grep B. More is used to find files. Find is used to find files. Reference: Roderick W. Question: 241 The maximum size of the swap partition is _____ MB? Answer: 128 (?) Page 87 of 217 . Sybex Linux + Study Guide: Page 433. Question: 239 Which of the following commands can be used to generate a list of all errors recorded during the month of March? A. you must use the umount command followed by the device name or mount point. Incorrect Answers: B. D. C. Question: 240 The recommended minimum size of the swap partition is ______ MB? Answer: 16. Explanation: Grep is a very useful tool for searching the contents of files based on various search criteria. C. syslogd Answer: A. although a minimum of 16 MB is recommended. Inside Linux: Page 13. Syslogd is used to generate TCP/IP error messages and write them to a file as specified in the syslog. more D. The question states that the floppy is mounted as /floppy. not search the contents of files. Sybex Linux + Study Guide: Page 469-470. To save the cached data to disk. /dev/floppy is the wrong mount point. you could return every line of text that contains the word 'March'. Tobler. Mount is the wrong command. For example. Explanation: The swap partition should ideally be twice the amount of physical RAM. find C. New Riders. D. you will lose the cached data.conf file. If you eject the disk without unmounting it.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: Care should be taken when ejecting floppy disks because Linux caches access to them. Smith. Incorrect Answers: B.

Incorrect Answers: B. Reference: Michael J. not numbers. reinstall Windows 95.6 kernel. SCSI hard drives use sd not hd. How could you manage to install Linux on this computer with the least amount of effort? A.iu. Comment. Question: 243 You are partitioning your second SCSI hard drive. possible incorrect answer: in the kernel archive. Use fips to resize the partition containing the Windows 95. D. Inside Linux: Page 17. B.ussg. fdisk hda2 Answer: B. Create a directory under Windows 95 and install Linux in that directory. Repartition the hard drive. Tobler. You cannot install Linux into a subdirectory in Windows 95. fdisk sda2 B. thus freeing up enough space to create a Linux partition. C. Sybex Linux + Study Guide: Page 43. However. fdisk sdb C. SCSI hard drives use sd not hd. the limit is 8 files of 2 gig for an maximum of 32 gig for the 2.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: The maximum size of a Linux swap partition is 128MB. Smith. Sybex Linux + Study Guide: Page 463. Reference: Roderick W. You cannot run Windows 95 and Linux on the same computer. Page 88 of 217 . Answer: A. It is not necessary to reinstall Windows 95. D.4 and 2. You can run Windows 95 and Linux on the same computer. SCSI hard drives use letters. there is no free space available.0/1685. New Riders. It can reduce the size of the Windows 95 partition without losing any data. [Andrew Morton] (the linuxhacker) http://www. Explanation: SCSI hard drives use the sd<letter> notation with the first drive being letter a (sda) and the second drive being letter b (sdb). What command should you use? A. C. Smith. Incorrect Answers: A. C.edu/hypermail/linux/kernel/0306. fdisk hdb D. Reference: Roderick W. Explanation: FIPS is a partition resizing tool.html Question: 242 You have a computer with Windows 95 installed and want to install Linux on it. although Linux supports up to 16 swap partitions. D.

Sybex Linux + Study Guide: Page 457. 0x83 is the type code for a file system partition. empty hard drive that you will use for Linux. C. Reference: Roderick W. Explanation: Page 89 of 217 . Answer: D. Question: 245 What type would you set on a partition to make it a swap partition? A. B. 0x83 C. 0x82 B. D. Incorrect Answers: B. not the partition table. D. w B. Smith. Smith. C. Reference: Roderick W. Format the hard drive to use the ext2 filesystem. Sybex Linux + Study Guide: Page 541. swap Answer: A. S is not a partition type code. a D. The m option is used to display the main menu.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 244 While using fdisk what command would you use to see the partition table? A. not display the partition table. m C. Incorrect Answers: A. Create an extended partition to be used for the data. The w option is used to write the changes. C. The a option is used to toggle a bootable flag on a partition. not display the partition table. B. Create a swap partition of type 82. Explanation: Swap partitions use the type code 0x82. p Answer: D. Create a primary partition using fdisk. What is the first step you use? A. s D. Explanation: The p option used with fdisk is used to display the partition table. Swap is not a partition type code. Question: 246 You have a new.

Sybex Linux + Study Guide: Page 457. kilobytes. B. D. You can format the primary partition but when you try to format the extended partition it fails. so the syntax is likely to be correct. Answer: C. There is no special command to format extended partitions. Smith. You successfully formatted the primary partition. Question: 248 When you create a new partition. you are prompted to enter the starting and ending cylinders (although you can specify a size in bytes. a swap partition and an extended partition. Question: 249 In order to apply a filesystem to your new partitions you must format them. C. Page 90 of 217 . What command would you use to create the ext2 filesystem? Answer: mkfs. Smith. C. B. Reference: Roderick W. You should have created another primary partition instead of an extended partition. not a swap partition. you need to designate its size by defining the starting and ending __________Answer: cylinders. You need to create a partition before you can format it.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 The first step to installing Linux on a new hard disk is to create a primary partition. Reference: Roderick W. (This can also be done as part of the installation process). You cannot format an extended partition. D. B. For this reason. Incorrect Answers: A. Explanation: The purpose of an extended partition is to house logical partitions. Explanation: When creating a new partition. You have to use the fdformat command to format extended partitions. You don't need to create two primary partitions. Incorrect Answers: A. you cannot format an extended partition (you must create a logical partition first). megabytes or gigabytes). Linux needs a primary partition to boot from. Your syntax is wrong for the format command when attempting to format the extended partition. Sybex Linux + Study Guide: Page 458. Question: 247 You have created a primary partition. Linux needs a primary partition to boot from. not an extended partition. What is the problem? A. Reference: Roderick W. Sybex Linux + Study Guide: Page 459. Smith.

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

Explanation: The command used to format a partition (which creates a file system) is mkfs (make file system). Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 459. Question: 250 When formatting your partition with the mkfs command, you can also pass to the command the type of filesystem and the number of _______? Answer: blocks. Explanation: When formatting a partition with the mkfs command, you can specify the number of blocks although this isn't necessary because mkfs can calculate this based on the size of the partition. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 459. Question: 251 You have new documentation that you wish to install so that it will be available to your users. Which directory would be the most appropriate to use for these files? A. /tmp B. /usr C. /lib D. /mnt Answer: B. Explanation: Most documentation including man pages is kept in the /usr directory. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 469. Incorrect Answers: A. /tmp is not the usual location for documentation. C. /lib is not the usual location for documentation. D. /mnt is not the usual location for documentation. Question: 252 Each inode contains extensive information on a file. Which of the following is not contained in the inode? A. File size. B. Filename. C. File's owner. D. Number of links to the file. Answer: B. Explanation: An inode contains the type (for example, plain file, directory, symbolic link, or device file) of the file; its owner, group, and public access permissions; the owner and group ID numbers; its size in
Page 91 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

bytes; the number of links (directory references) to the file; and the times of last access and last modification to the file. However, an inode does not contain the name of the file. Reference: http://perl.plover.com/yak/ext2fs/slide019.html Incorrect Answers: A. An inode does contain the file size. C. An inode does contain the file's owner. D. An inode does contain the number of links to a file. Question: 253 When you issue the command ls -1, the first character of the resulting display represents the file's _________Answer: type. Explanation: The first character displayed in the output of the ls -l command represents the file's type. For example, d represents a directory. Reference: http://www.firstlinux.com/articles/cards/permissions.shtml Question: 254 In order to run fsck on the root partition, the root partition must be mounted as _________. Answer: read only. Explanation: Fsck must only be run on unmounted or read only partitions. This is because any changes to the file system during normal read/write operations can confuse fsck and cause file system corruption. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 462. Question: 255 You cannot mount /dev/hdb1 and suspect that the superblock is bad. How do you fix this? A. Use the mkfs command. B. Use the fsck command with the -f option. C. Use the e2fsck to replace the superblock with a copy saved to another location on your disk. D. Restore the superblock from your tape backup. Answer: C. Explanation: The e2fsck utility can be used to replace the superblock with a copy saved to another location on the disk. Reference: http://www.mandrakeuser.org/docs/admin/arecov3.html Incorrect Answers:
Page 92 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

A. The mkfs command will format the disk causing data loss. B. Fsck cannot be used to restore the superblock. D. You cannot restore the superblock from a tape backup because you cannot mount the drive. Question: 256 Why should you track the amount of free space on your disk? A. If there is no free space, you will not be able to write to that filesystem. B. If there is no free space, you will not be able to install new applications. C. If the amount of free space becomes less then 50 percent, then your system will slow down. D. If the amount of free space is too low, you system will not boot. Answer: A. Explanation: If there is no free space on a disk, you will not be able to write to that disk. Incorrect Answers: B. You will not be able to install new applications, but that is less of a problem than not being able to write to the disk. C. Disk space of less than 50% will not slow the system down. D. Low disk space will not prevent the system booting. Question: 257 You want to know how much space is being occupied by your user's home directories. Which of the following will provide you with this information? A. du -l /home B. du -b /home C. du -m /home D. du -c /home Answer: D. Explanation: The du (disk usage) command with the -c option will display the total used space in the specified directory. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 477. Incorrect Answers: A. The -l option is used to count the size of all files, whether or not they have already appeared (i.e., via a hard link). B. The -b option is used to display the size in bytes of all the files in the specified directory. C. The -m option is used to display the size in megabytes of all the files in the specified directory. Question: 258 You also need to know the amount of free space on the partition containing the user's home directories. Which of the following commands will provide this information? A. df /home B. df -i /home C. df --sync
Page 93 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

D. df -T Answer: A. Explanation: The df (disk free) command is used to display the free space in the specified partition or directory. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 471. Incorrect Answers: B. The -i option is used to display information about the inodes, not the free space. C. You need to specify the /home directory. Also, the -sync option is incorrect. D. You need to specify the /home directory. Also, the -T option is incorrect. Question: 259 You notice that the amount of free space is getting low. When you check the contents of the /tmp directory, you find several hundred files so you delete them. After deleting these temp files, you check the amount of free space, however, it has not increased. What should you do? A. Move the /tmp directory to another partition. B. Delete the partition containing the /tmp directory, recreate it and restore its contents. C. Delete the /tmp directory and recreate it. D. Run fsck on the filesystem containing the /tmp directory. Answer: C. Explanation: The easiest way to fix this is to delete and recreate the /tmp directory (it's easy because the directory is empty). Incorrect Answers: A. It is not necessary to move the /tmp directory to another partition. B. There are no contents to restore as they have been deleted. D. Fsck is time consuming and hence unnecessary. Question: 260 You have the /var directory on its own partition. You have run out of space. What should you do? A. Reconfigure your system to not write to the log files. B. Use fips to enlarge the partition. C. Delete all the log files. D. Delete the partition and recreate it with a larger size. Answer: B. Explanation: FIPS is a partition resizing tool. It can reduce or enlarge a partition without losing data. Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 43. Incorrect Answers: A. You should not prevent the system writing log files. C. You should not delete all the log files. D. It is unnecessary to delete the partition, which would require restoring the data.

Page 94 of 217

C. You can boot Linux by typing Linux at the Linux boot prompt. Question: 262 When the kernel is loading.messages file. D. dmesg B. Man logs would display the man files for a program named logs. From a floppy disk. it writes any messages to the /var/log/boot. Reference: Roderick W. Explanation: When the kernel is loading. cat kernel. Question: 263 What command can you use to see the boot messages? A. Question: 264 Page 95 of 217 . it writes any messages to the _______ file. Sybex Linux + Study Guide: Page 213/4. D. Which of the following is not one of these? A.messages file. Incorrect Answers: B.messages C.messages. Smith. Answer: /var/log/boot. C. Smith. You can boot Linux with a Linux boot floppy disk. C. Reference: Roderick W. Reference: Roderick W. Type linux at the boot: prompt. B. logview D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 261 You can start Linux in many different ways. Logview is the incorrect command to view the boot messages. Sybex Linux + Study Guide: Page 615. Smith. Explanation: The dmesg utility displays all the boot messages that were displayed during system boot up. Sybex Linux + Study Guide: Page 615. You can boot Linux using a boot loader such as LILO. Explanation: 'Linux' is not a DOS command and so cannot be used to start Linux. Incorrect Answers: B. Answer: A. man logs Answer: A. The boot messages are not stored in the kernel. Type linux from a DOS prompt under Windows 95. D. Using a boot loader such as LILO.

Page 96 of 217 . Incorrect Answers: A. Defines how to handle the entry. Incorrect Answers: A. D.conf is not a daemon.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 After the kernel is loaded. Reference: Roderick W. The process field specifies the command to execute.conf C. C. B. it calls the ______ daemon which is responsible for creating new processes. The ID field identifies the entry. The runlevel field defines which runlevels this line applies to Question: 266 Which file should you examine to determine the defined runlevels for your system? Answer: /etc/inittab Explanation: The inittab file is the configuration file for the init daemon. Reference: Roderick W. The purpose of the action field is to tell the init daemon what to do with each process. Smith. Sybex Linux + Study Guide: Page 399. What is the purpose of this field? A. Answer: C. Explanation: The inittab file is the configuration file for the init daemon. Sys. Question: 265 Each entry in the /etc/inittab file contains four fields the third of which is the Action field. D. Explanation: The init daemon (initd) is sometimes known as a "super server". A. Inittab is the configuration file for the init daemon. init D. D. B. syslog Answer: C. because it is responsible for starting all the other services (processes). Sybex Linux + Study Guide: Page 393. Syslog is not a daemon. B. Identifies the entry. Smith. Specifies the command to execute. sys. inittab B. Defines which runlevels this line applies to. The format of each entry in the inittab file is ID: runlevel: action: process. This file contains the defined runlevels on a Linux system.

init [runlevel] B. Question: 269 Where are the startup scripts defined? A. Users can only log into the system across the network.init [runlevel] Answer: A.redhat. All processes are stopped and the root filesystem is mounted as read-only when in single user mode. /etc/start Page 97 of 217 . In this mode. Init does not read the /etc/inittab file. Explanation: Single user mode (sometimes known as single user maintenance mode or runlevel 1) is used to carry out maintenance to a system. Smith. Explanation: The correct command to change the runlevel of a Linux system is 'init [runlevel]'. D. Answer: C. halt [runlevel] C.d B.com/linux/cmd/i/init. only root can log in. /etc/init.init is not a command. C. D.html Incorrect Answers: A. Question: 267 How does single user mode differ from other runlevels? A. Network services are disabled. /etc/inittab D. network services are disabled and only the root user can log in. sys. It is a configuration file for the init daemon. Users cannot log in to the system. Reference: http://www. B. /etc/inittab is not a command. D. Reference: http://www. Sybex Linux + Study Guide: Page 399. Init does read the inittab file. sys. Halt is the incorrect command. B.oreillynet.html Incorrect Answers: B. Not all processes are stopped and the file system is not mounted in read only mode. Question: 268 What should you type to change the runlevel of your system? A. /etc/scripts C. C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Reference: Roderick W.com/docs/manuals/linux/RHL-7.3-Manual/custom-guide/s1-rescuemodebooting-single.

Incorrect Answers: B. D. /etc/inittab Answer: A. the init daemon starts the scripts defined in the /etc/init. There is a script to run fsck. B. Page 98 of 217 . Explanation: The init daemon runs the rc startup scripts to start various processes when the system boots. Sybex Linux + Study Guide: Page 411-412. C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D.mod B. What file do you use to pass parameters to a module? A. Question: 270 Which of the following tasks is not controlled by one of the rc startup scripts? A. Smith. /etc/modules C. Reference: Roderick W. Mount files ystem. Smith. Inittab is the configuration file for the init daemon. Backup user's directories. Load modules. /etc/inittab D.modules Answer: D. C. D.modules file is used to associate a module (driver) with hardware device. Explanation: The /etc/conf. Answer: A. Reference: Roderick W. This is the incorrect folder. Explanation: When a system starts up. There is a script to load modules.d folder according to the configuration in the inittab file. D. There is a script to mount the file system. Sybex Linux + Study Guide: Page 402. Incorrect Answers: B. /etc/conf. This is the incorrect folder. C. Backing up user directories is not controlled by one of these scripts. Smith. /etc/conf. Question: 271 Modules are pieces of kernel code that you can load or unload. Run fsck. Sybex Linux + Study Guide: Page 394. Reference: Roderick W.

is used to configure the init daemon which is used start the powerd daemon.ups Answer: B. /etc/power. B. /etc/conf.html Incorrect Answers: A. The init daemon only reads its configurations file during boot. It is not necessary to change the runlevel. C. B. Reference: Roderick W. D. The init daemon can be instructed to read its configuration file at any time. C. D. D. The /etc/inittab file. is used to configure the init daemon which is used start the powerd daemon. Question: 272 You have installed a new UPS (Uninterruptible Power Supply) and the powerd daemon. B. Question: 273 You have made changes to the /etc/inittab after installing your UPS. The configuration file for the init daemon is /etc/inittab. /etc/inittab C. /etc/ups.conf D. not the /etc/conf. Explanation: The init daemon is responsible for starting processes. Issue the init q command. This file should be edited to instruct the system to run the powerd daemon in the event of a power failure. Reference: http://www.mod is not the name of the module configuration file. Incorrect Answers: A. The /etc/inittab file. /etc/modules is not the name of the module configuration file. C. How do you institute these configuration changes without having to reboot your computer or have your users log off? A.oreillynet. /etc/conf.conf file.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Incorrect Answers: A. not the /etc/ups. Answer: C. not the /etc/power. Page 99 of 217 .com/linux/cmd/i/init. is used to configure the init daemon which is used start the powerd daemon. Issue the command source /etc/inittab. Explanation: The init q command is used to instruct the init daemon to reread the /etc/inittab file and carry out the instructions in the file. The /etc/inittab file is used by the init daemon.conf file.conf B. Smith. Change the runlevel to single user mode.ups file. Sybex Linux + Study Guide: Page 399. Source is the incorrect command. The /etc/inittab file. Which file should you use to define the steps to be taken in the case of a power failure? A.

Tobler. Hold the shift key down when booting until you get a prompt. C. Inside Linux: Page 374. Answer: C. LILO can be used to specify up to 16 different boot images. Answer: B. B. B. You don't need to hold the shift key down whilst booting. press the Tab key. Smith. You can choose any installed boot image. Question: 276 You have made changes to the LILO configuration file but you are not sure the changes will work. Sybex Linux + Study Guide: Page 213. C. Incorrect Answers: A. you don't have to boot the default image. LILO -c filename C. B. LILO can be used on a floppy disk to install Linux. Incorrect Answers: A. you cannot remember what you named them and you do not want to boot your default image. It can be used on a floppy to boot Linux. It must replace the master boot record on your hard drive. Question: 275 You boot your system using LILO. D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 274 Which of the following statements is not true about LILO? A. D. LILO -s filename D. D. but this isn't a requirement. not the Alt key. Explanation: The default location for the Linux boot loader is in the Master Boot Record (MBR). LILO -t B. Reference: Michael J. Reference: Roderick W. It can specify up to 16 different boot images. LILO Page 100 of 217 . press the Alt key. What should you do? A. Explanation: At the LILO boot prompt. You have to boot your default image and then look at the configuration file. It will work with other operating systems such as DOS and Windows. you can use the tab key to toggle between the various boot images on the system. LILO will work with other operating systems such as DOS and Windows. You need to press the tab key. New Riders. How can you test the new configuration without installing it? A. C. D. It can be located elsewhere. Although you have four different boot images on your system. At the boot: prompt. At the boot: prompt.

Sybex Linux + Study Guide: Page 216/7. not the -c option. Page 101 of 217 .edu/udp/admin/linux-howto. C. not the -s option. C. Change the label to boot: instead of linux. not prompt=30. you need to add a line containing the word prompt to the lilo.0. Explanation: To configure LILO to display a boot prompt.conf.conf file. Smith. Add a line containing prompt=30.b image=/boot/vmlinuz-2. Incorrect Answers: B.colorado. There is no timeout option for the lilo.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: A. What changes should you make to the /etc/lilo. Reference: http://www-ugrad. Explanation: The -t option used with LILO is used to test the LILO configuration file (/etc/lilo. You need the -t option to test the configuration.7 label=linux root=dev/dha1 You would like to start in a single user mode but you do not get a boot: prompt.conf file is as follows: boot=/dev/hda map=/boot/map install=/boot/boot. Add a line containing prompt.0. The LILO command without any options will install LILO without testing the configuration file. D. The line should contain just prompt.conf file to make a prompt appear every time you boot your system? A.conf Explanation: The LILO configuration file is /etc/lilo. Smith. C. Question: 278 Part of your /etc/lilo.conf file. Sybex Linux + Study Guide: Page 216. You need the -t option to test the configuration. B. Reference: Roderick W. D. You must then run the LILO command to activate the changes.conf).html Incorrect Answers: B. Reference: Roderick W. Question: 277 What is the complete name of the default configuration file for LILO? Answer: /etc/lilo. Answer: A.cs.36. Add a line containing a timeout.

If LILO wasn't installed properly. Install the configuration changes by issuing the command /sbin/lilo -u. shutdown -r now D. shutdown -h now C. you would see the word LI during boot up. Sybex Linux + Study Guide: Page 634. The label is just the displayed name of the operating system. D. Which of the following commands will halt your system so you can install the new hardware? A. usually media failure. B. you wouldn't see any part of the work LILO during boot up. If LILO loaded successfully. Sybex Linux + Study Guide: Page 218. usually a geometry mismatch. Question: 279 You have changed /etc/lilo. you must run the lilo command to activate the changes. when you restart your computer you still do not have a prompt. LILO could not load the map file. Reference: Roderick W.when booting the system.conf file. If LILO could only complete the first stage. You must not rename the configuration file. Reference: Roderick W.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. What could be the problem? A. Answer: B. C.conf. Install the configuration changes by issuing the command /sbin/lilo. Smith. Smith. C. Explanation: After making changes to the lilo.new. Install the configuration changes by issuing the command /sbin/lilo -t. Rename your configuration file to /etc/lilo. The -t option will test the configuration but not activate the changes. LILO loaded successfully but the kernel is corrupt. Answer: D. C.conf to cause a boot: prompt to show. D. B. B. LILO is not installed properly. shutdown -k now B. Question: 280 When booting your system after installing LILO you see LIL. you would see the word LILO during boot up. Question: 281 You are going to install a new hard disk in your system. LILO could only complete the first stage. You need to run the lilo command without any options to activate the changes. shutdown -t now Page 102 of 217 . Incorrect Answers: A. C. Incorrect Answers: A. it means that LILO could not load the map file. D. however. Explanation: If you only see LIL.and then nothing happens. What should you do? A.

Smith. C. only root can run the shutdown command. Explanation: When using the shutdown command. The -t option is used to delay the shutdown.conf file. It is not necessary or desirable to give the technician the root password. Any user listed in the shutdown. but would not actually shut down the system.allow file can shutdown the system. B. B. Which of the following commands will send a message to the users? A. Give him the root password and change it when you arrive the next morning. Smith. you can enter a message that will be displayed to users before the system shuts down. Sybex Linux + Study Guide: Page 420/1. The -k option would display a warning message. You cannot do this. Explanation: The shutdown -h command will shut down your system properly. D. The -r option would cause the system to restart. Reference: Roderick W. Question: 283 You are going to reboot your system but want to warn your users to log off. You do not want to give him the root password.allow file. shutdown Answer: D. Sybex Linux + Study Guide: Page 420/1.conf is the wrong file. Add his username to the /etc/shutdown. halt C. Incorrect Answers: A. Reference: Roderick W. Question: 282 You have a technician who will come in after hours to install new hardware in your system. The -h option issues the halt command as part of the shutdown process. D. Shutdown. Reference: Roderick W.allow file contains the names of the user accounts that are permitted to shutdown the system. Incorrect Answers: A. Answer: C. reboot D. Explanation: The /etc/shutdown. How can you accomplish this? A. Page 103 of 217 . D. Smith. Sybex Linux + Study Guide: Page 420/1. C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: B. but he needs to be able to shutdown the system. Add his username to the /etc/shutdown. init B.

when you enter man hosts_access you get the man page for routines used to programmatically manipulate access. Smith.allow. D. Explanation: To search for text within a man page. C. locate manpath Answer: C. If the directory was searched later. Question: 285 You want to find how to set the manpath variable so you type man man. You wouldn't get a different page. but you would have to come out of the man program to use it. the find command cannot search for text. What is the problem? A.allow. B. The reboot command does not send a message to users. B. however. The files used to control host access is hosts. but you would have to come out of the man program to use it. D. Incorrect Answers: A. The page you are looking for resides in a directory that is searched later. /manpath D. Question: 286 Page 104 of 217 . not hosts_access. B. The page you are looking for does not exist on your system. Sybex Linux + Study Guide: Page 364. D. you would use the / command followed by the word you were looking for. You could use the grep command. The installation of man pages on your system is corrupt. B. grep manpath B. you would get an error saying so. The correct command would be man hosts. C. The halt command does not send a message to users. Furthermore. What would you type while displaying the page to find the location where manpath is discussed? A. find manpath C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Incorrect Answers: A. Explanation: You typed the command incorrectly. Reference: Roderick W. The init command does not send a message to users. It is used for locating files. If the installation of the man pages is corrupt. You typed the name of the page incorrectly. Incorrect Answers: A. you would still get the correct page eventually. you wouldn't receive any man pages. Find is not a man program command. Question: 284 You want to review the man page on the files used to control host access. If a page didn't exist. Answer: C. You could use the locate command.

B.profile file. Reference: http://www. info help Page 105 of 217 . You can only have one version of man pages installed on your system at a time. Reference: http://www. Question: 287 You have installed an additional set of man pages but in Spanish. -C is the wrong option to search the man pages for a specified string. man -c password D. C. info info D. man -k password C. D. Instruct the user in how to reset the MANPATH variable whenever he logs in. info C. What should you do to accomplish this? A. You can have multiple versions of man pages installed on a system. Explanation: The man -k command is used to search the man pages for a specified string. man info B. Answer: C.edu/depts/accc/hardware/borg/profile. D.uic. -c is the wrong option to search the man pages for a specified string. You would need to edit this variable to point to the Spanish man pages. man -q password Answer: B.html Incorrect Answers: A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 You wish to find the man page that discusses how to change a password.profile file located in that user's home directory. B. It is unnecessary to reset the manpath variable every time the user logs in. man -C password B. Explanation: The manpath variable can be set in the . How can you access a tutorial on using info? A. Edit the man. Which command will find the appropriate page? A. C.html Incorrect Answers: A. Question: 288 You know that the info utility provides easier to understand documentation but you have never used it. D.config file. not the man. Edit the . -q is the wrong option to search the man pages for a specified string. You have one user who wishes to use the Spanish pages rather then English ones.config file located in that user's home directory.oreillynet.profile file and is used to instruct the man program where to look for the man pages.com/linux/cmd/a/apropos. You type man password but you get the message that no manual entry for password exists. You need to edit the . You only need to set it once in the .profile file.

C. Question: 290 What does FAQ stand for? Answer: frequently asked questions Explanation: Frequently asked questions are often referred to as FAQs. Smith. Reference: Michael J. Tobler. /usr/MyApp Page 106 of 217 . These documents are normally installed in which directory? A. Reference: Roderick W. Incorrect Answers: A. Inside Linux: Page 8. The info command would run the info program. Sybex Linux + Study Guide: Page 657. Info info is used to access a tutorial on the info program. /usr/lib/HOWTO Answer: B. Question: 289 There is considerable documentation covering various tasks provided as HOWTOs. The HOWTO documents are not located in the /usr/HOWTO directory. The HOWTO documents are not located in the /etc/HOWTO directory. D. but not display a tutorial about it. Man info would display the man pages for the info program. Smith. /etc/HOWTO B. The HOWTO documents are not located in the /usr/lib/HOWTO directory.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: C. Explanation: The default location for the HOWTO documents is /usr/doc/HOWTO. Explanation: Info pages are easier to understand than the sometimes complex man pages. B. Question: 291 When you install a new application. Info help would display documentation on the help command. New Riders. documentation on that application is also installed. Incorrect Answers: A. Where would you look for the documentation after installing an application called MyApp? A. Reference: Roderick W. Note: /usr/share/doc/HOWTO deserves attention. /usr/HOWTO D. Sybex Linux + Study Guide: Page 657. The info info command is used to access a tutorial on the info program. D. /usr/doc/HOWTO C.

Question: 292 You need to update your HOWTOs. Your local Linux User Group should have a copy. Reference: http://www. Linux Documentation Project. Where should you go to acquire the latest version? A.com D.org/ Incorrect Answers: A.or they may not. They can be found at www. Smith. Reference: Roderick W. Application documentation is not located in the /lib/doc directory. Application documentation is located in the doc subdirectory of the /usr directory. C. /lib/doc/MyApp C. Explanation: The default location for application documentation is in the /usr/doc/<application name> directory.org. Your local Linux User Group may have a copy . Page 107 of 217 . Answer: D. In the same directory where the application is installed. Question: 293 You have a problem installing an older CD-ROM drive on one of your Linux servers. /usr/doc/MyApp D. Explanation: The Linux Documentation Project has all the latest HOWTOs.tldp. C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B.com is the Google search engine specifically designed to search for news groups.deja. The website for your distribution will have HOWTOs relating to your distribution but not all the applications that you may have installed.linux-help. The web site for your distribution. http://www. Linux Mall and order a new CD. Answer: C. Sybex Linux + Study Guide: Page 657. The HOWTOs can be downloaded from the Linux Documentation Project website.com Answer: A. B. http://www. http://www. Incorrect Answers: A. Where could you go to search the newsgroups to look for a solution? A. D.com B.news.deja.com C. http://www. B. Explanation: www. Application documentation is not located in the same directory where the application is installed.lug. D. You don't need to order a CD. You have checked the HOWTOs and FAQs but have not found your answer.tldp. B.

Reference: Roderick W.oreillynet. library directories and man page directories.com/linux/cmd/w/which. You would not search for news groups at this site. C. Reference: http://www. Explanation: The whereis command searches for files in a restricted set of directories such as standard binary file directories. Incorrect Answers: A. There is no whereis database to update.com Incorrect Answers: B. You wouldn't use the whereis command to look for source files. The whereis command does not search the entire directory tree.deja. Explanation: Page 108 of 217 . What is the disadvantage of using it? A. Explanation: The which command is used to display the full path to the program that would be run if a specified command was issued. The whereis command only searches known directories that are hard coded into the command. Since it searched the entire directory tree. Question: 294 The whereis command is helpful in finding the location of a command as well as its related man page. the whereis command can take an excessive amount of time. B. You would not search for news groups at this site. What command can you use to determine its purpose. D.html Question: 296 You locate a command in the /bin directory but do not know what it does. What command would you use to determine the location of the command being run? Answer: which. D. Answer: D. You would not search for news groups at this site. Answer: whatis. B. Smith. Question: 295 You suspect that you have two commands with the same name as the command is not producing the expected results. You have to update the whereis database in order to keep it current. The whereis command will not find source files located on your system. C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Reference: http://www. C. Sybex Linux + Study Guide: Page 652.

It is the same as the man -f command. Updatedb is the wrong command to update the whatis database. C. It is not the same as the man -f command. It is the same as the man -k command.org/cgi-bin/man-cgi?makewhatis+8 Incorrect Answers: B. Answer: A. not the locatedb database.com/linux/cmd/w/whatis. Explanation: The makewhatis command is used to update the whatis database. Reference: http://www. Question: 298 What does the apropos command do? A.tac. B. The database is not updated automatically. updatedb C. It uses the locatedb database to answer your query. It searches the short descriptions from the man pages.eu. Any kernel patches you might apply. Make whatisdb is the wrong command to update the whatis database. C. not the man -K command (note the capital K). It uses the whatis database.html Question: 297 What command must you run to update the database used by the whatis command? A. D. Answer: C. Whatis only searches for a single word.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 The whatis command searches a database of short man pages to determine the purpose of a command. It is the same as the man -K command. Question: 299 Which of the following items would not be important for you to record in your system documentation? A.html Incorrect Answers: A. D. D. B. The database is updated automatically.oreillynet. B. makewhatis B.oreillynet. Reference: http://www. Page 109 of 217 . Applications that are installed. Explanation: The apropos command is similar to the whatis command in that is searches the short descriptions from the man pages for a specified string. make whatisdb D. Reference: http://www.com/linux/cmd/a/apropos.

D. Page 110 of 217 . D. Smith. Question: 301 Which of the following commands will make your home directory your working directory? A. Reference: Roderick W. When did each user log on last? D. C. However. Incorrect Answers: A. but this is not as helpful as application documentation. Email your user's your office hours. It would be helpful for your users to know your working hours. Incorrect Answers: B. cd. Explanation: Documentation is an important part of any system administrator's job. Using as much technical language as possible when explaining what went wrong would confuse the user and would gain nothing. Any kernel patches should be documented. Question: 300 Which of the following would improve your ability to provide user support? A. Any installed applications should be documented. Create a directory containing instructions for using all installed applications. Answer: C. cd B. You wouldn't leave after every problem you fixed. D. Sybex Linux + Study Guide: Page 438. D. Use as much technical language as possible when explaining what went wrong. the last time each user logged on is not important and does not need to be documented.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C. Explanation: A directory containing instructions for using all installed applications would make a system administrator's job much easier. B. cd home C. fix it and leave. you will by default be taken to your home directory. B. Answer: A. Explanation: When the cd command is used without specifying a directory. Any system problems should be documented. Smith.. Reference: Roderick W. Sybex Linux + Study Guide: Page 438. cd home/username Answer: A. Whenever a user has a problem. C. What problems with the system you have had.

Explanation: The a option used with the ls command is used to display hidden files. tom. Tobler.html Question: 304 You have three files in the /home/ben/memos directory called letters. It does not display hidden files and it does not search subdirectories. ls -aR /home/username C. Question: 302 Which of the following commands will show a list of the files in your home directory including hidden files and the contents of all subdirectories? A. Incorrect Answers: B. D. D. How could you determine each file's type by issuing only one command? Answer: file letters tom betty Explanation: The file command is used to display a files type. C. The R option makes the search recursive meaning that any subdirectories will be searched.mem Explanation: The -r option displays the files in reverse order.html Incorrect Answers: A. The cd home/username command would not take you to your home directory. and betty. The -l command displays the files permissions. ls -c home B. The -A option does not search the '. Answer: ls -r /home/ben/memos/*.oreillynet.com/linux/cmd/l/ls. Page 111 of 217 ..oreillynet. Reference: http://www. C. Cd home would take you to a subdirectory of your current directory named home.mem will be displayed. Reference: http://www. ls -Af /home/username D. command would take you up one level in the directory tree.' directory.com/linux/cmd/l/ls. Question: 303 What command should you type to see all the files with an extension of 'mem' listed in reverse alphabetical order in the /home/ben/memos directory. New Riders. The '*' is a wildcard which means that any file that ends with . The cd. You can enter multiple filenames after the file command.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Reference: Michael J. Inside Linux: Page 55. ls -l /home/username Answer: B. The -c option is used to list files by status change time.

C. B. D. You can combine multiple files into one file or append information to a file with the cat command. Smith. Reference: Roderick W. Answer: D. Explanation: You can use the redirection operator (>) with the cat command to combine multiple files into one file.com/linux/cmd/f/file. The most common use of the cat command is to display the contents of a file. It cannot be used to change the contents of a file (although it can add append data to a file). not the more command. ls tom betty > friends B.oreillynet. cat tom betty > friend C. Incorrect Answers: A.html Question: 305 Which of the following commands will combine the contents of the files tom and betty into a new file called friends? A. Reference: Roderick W. Smith. D. Question: 306 Which of the following cannot be accomplished with the cat command? A. C. page C. Incorrect Answers: A. Display the contents of a file. not the ls command. more tom betty > friends D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Reference: http://www. Explanation: The cat command is typically used to display the contents of a file. Append information to another file. tr Page 112 of 217 . You need the cat command. B. You can create a new file with the cat <filename> command. There is no semi-colon (. You need the cat command. less B. Question: 307 Which of the following commands will display a file one screen at a time? A. Change the contents of a file. Create a new file.) between the filenames to be combined. cat betty > friends Answer: B. Sybex Linux + Study Guide: Page 654. Sybex Linux + Study Guide: Page 654. C. cat tom.

Reference: http://www. cat Answer: A. Syslog daemon. Question: 308 You are debugging a new application that is crashing. log Answer: C. D.com/linux/cmd/l/less. Explanation: less is a program for paging through files or other output. You want to watch the messages as they are being written to the log. It does not display the contents of a file one screen at a time. The Server Message Block daemon provides this service. Question: 309 A customer needs a Linux server to act as a Microsoft Windows NT server. The tail command is used to display the last ten lines of a specified file. Server message block daemon.The head command is used to print the first ten lines of a specified file. What command should you use? A. Explanation: Server Message Blocks (SMBs) are used by Windows clients for network communications. Answer: C.csp?path=l/less Incorrect Answers: A. C.oreillynet. Reference: Page 113 of 217 . B. D. tail B. File transfer protocol daemon.oreillynet. Explanation: The less command will display the contents of a file one screen at a time. Reference: http://www. Which of the following must be installed for this server? A. less D. log is not a valid command.com/linux/cmd/cmd. B. The cat command is used to display the contents of files but it will scroll down to the bottom of the file. C. Tr is used to translate characters.html Incorrect Answers: B. head C. Network file system daemon. D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. There is no page command.

The syslog daemon is used to log system messages. lpr C.oreillynet. but does not want the extra jobs to print out when it comes back online. Smith. Explanation: The 'lpc clean all <printername> command is used to remove files that cannot be printed from the specified printer queues. The Network File System daemon is used for communication between Linux computers. It accepts print jobs submitted by the lpr command. She wants to power cycle the printer.oreillynet. but nothing is printing out. /configure <filename> Answer: C. Incorrect Answers: A. chown +x <filename> C.com/linux/cmd/c/chmod. D: /configure <filename> is not the correct command. The chmod command is used to change the access mode (permission) of the file.com/linux/cmd/l/lpc. Reference: http://www. /<filename> B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Roderick W. lpd D. The 'lpc restart all <printername>' is used to restart the printer daemons on the specified printers. chmod +x <filename> D. The print jobs must be specified by job number which can be obtained using the lpq command. lpc B. Page 114 of 217 . lprm Answer: A. The File Transfer Protocol daemon is commonly used for transferring files across the internet. Sybex Linux + Study Guide: Page 354. Explanation: To make a script executable. D. The +x option keeps the existing permissions and adds the execute permission.html Incorrect Answers A: /<filename> is not the correct command. D: The lprm command is used to remove specific print jobs from print queues. B. not to make it executable. Which command would she use to accomplish this? A. Reference: http://www.html Incorrect Answers B: The lpr command is used to send print jobs to a print queue. C: Lpd is the line printer daemon. She has sent several jobs to the printer. Question: 310 A user is having problems printing to the network printer. you need to add the execute permission to the file. B: The chown command is used to change the owner of a file. Question: 311 Which command enables a user to make a newly created shell script executable? A.

Explanation: A file with the tar.com/linux/cmd/t/tar.gz C. you should use the tar command.oreillynet.tar. tar -xzf update.tar.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 312 An administrator who logged in as a standard user needs to kill process 1010 that was started by the root user.gz Answer: B. The x option is used to extract the files. gzip -p update. You can change the runlevel by issuing the 'init <runlevel> command (in this case 'init 1'). The filename is "update. su -single Answer: B. su -c "kill 1010" Answer: D Question: 313 The administrator for a Linux server needs to update the system and downloads the required patch. The z option is used to invoke gzip to uncompress the files and the f <filename> option is used to specify the filename. init 1 C. killall -9 1010 D.tar. Explanation: Single user mode is known as runlevel 1.gz D. The tar utility is used to 'tar' multiple files into one archive and the gzip utility is used to compress the files. untar -xzf update. gunzip -update.html Incorrect Answers A: The file was created with the tar utility which called the gzip utility to compress the files. cd /single D. you should use the tar command to uncompress the files.tar. Therefore. su "kill 1010" C. Which of the following commands would be the best way to uncompress this file? A. kill 1010 B. you should use the tar command to uncompress the files. C: The file was created with the tar utility which called the gzip utility to compress the files.gz extension has been processed by two programs.tar.gz". init 0 B. Question: 314 How could an administrator switch to single-user mode without rebooting the system? A. Reference: http://www. To uncompress the file.gz B. Which of the following commands will kill the process? A. D: Untar is not the correct command. Therefore. Page 115 of 217 .

Runlevel 0 is used to halt the system. Question: 316 The following is the output from a ps command: PID TTY TIME CMD 1054 pts/1 00:00:00 bash 6894 pts/1 00:00:00 nmap 7123 pts/1 00:00:00 ps The nmap process has been taking up too much processing power. Question: 315 An administrator needs to append the list of files in the /tmp directory to the existing file "DoNotCreateBackup". Explanation: The Kill command is used to kill the process. a file named DoNotCreateBackup). The default 'niceness' is 10.hu/doc/LinuxShellScript/rpf. Reference: http://www. B: && is not a valid command redirector. CTRL-Q.netti. the lowest priority is 19 and the highest is 1.html Incorrect Answers A: Init 0 will change the system to runlevel 0. The nice command is used to run a process with a lower priority. ls /tmp && DoNotCreateBackup C. D: :: is not a valid command redirector. ls /tmp >> DoNotCreateBackup D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Reference: http://www. D: Su -single will attempt to switch to a user named single.oreillynet.htm Incorrect Answers A: || is not a valid command redirector. it will append it to a file (in this case. Page 116 of 217 . bk nmap:6894 D.com/linux/cmd/i/init. ls /tmp :: DoNotCreateBackup Answer: C. bg nmap B. The -n19 option will lower the priority of the process. ">>" will take the output of the ls /tmp command and instead of displaying it on screen. What command can be used to run nmap with less resources? A. Explanation: The >> symbols represent a command redirector. When using the nice command. What command would accomplish this goal? A. ls /tmp || DoNotCreateBackup B. Kill 6894 : nice -n19 nmap <arguments> Answer: D. stop | back 6894 C. C: Cd /single will change to a directory named /single.

redhat. telnet D.oreillynet. B: Ping is used to test IP connectivity. Keeps the user in their current directory. Telnet is the user interface that communicates with another host using the Telnet protocol. bk is not the correct command. Returns the user to the root directory. Returns the user to their home directory. Reference: http://www.com/docs/manuals/linux/RHL-7.html Incorrect Answers Page 117 of 217 . it doesn't lower the priority of the process. C.html Incorrect Answers A: FTP is used to transfer files using the FTP (File Transfer Protocol).com/linux/cmd/t/telnet. D: Traceroute is another utility used to test IP connectivity by tracing the route to a remote host. (CTRL-Q is often used to turn all output stopped on screen back on). What does the command "cd~" do? A.html Incorrect Answers A: The bg command is used to run a process in the background. Question: 318 The current working directory is /var/spool/Tom/ip.com/linux/cmd/n/nice. ping C. Answer: B. Which of the following commands can be used? A. B: Stop | back is not the correct command. Returns the user to the parent directory of "ip". Question: 317 The system administrator wants to connect to his servers remotely to create a new user.3-Manual/getting-started-guide/s1-navigatingcd. traceroute Answer: C. C: CTRL-Q. However. Explanation: The 'cd~' command is the same as the 'cd' command in that it will return you to your home directory. which is why your home directory is sometimes known as your login directory. B. Your home directory is the default directory you are taken to when you log in. ftp B.oreillynet. Explanation: Telnet is used to access remote systems. Reference: http://www. Commands entered into a telnet console are executed on the remote system.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Reference: http://www. D.

Question: 320 Why would setting up separate file systems for /home and /var be appropriate? A. /usr/group B. Reference: http://www. to go up one level). What needs to be done? A. Guests accounts included in /var are separated from user accounts kept in /home. you would enter the command: cd. Explanation: The /var directory contains 'variable' system data such as log files.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A: To go to the root directory. Reference: Roderick W. Users can access /home for their personal applications and /var can store old applications. C: There are no guest accounts in the /var directory.org/docs/basics/bfiles2. B. not the /usr directory. D: /var is not used to store old applications. Smith. /etc/users Answer: C. Add the proper drive module to the kernel. D.mandrakeuser. It is a good idea to keep this data separate from the users' personal data stored in their home directories. Answer: A. B: /usr/users does not contain group information. B. /usr/users C. Incorrect Answers A: The group file is in the /etc directory. D: To go to the parent directory of the ip directory (in other words. Sybex Linux + Study Guide: Page 243. The system is not subject to failure from log file or user quota overruns. C: The cd command is used to 'change directory'.. Use a utility to edit fstab. C.html Incorrect Answers B: Quota overruns would not cause a system failure. Explanation: The /etc/group file contains a list of all the groups and the members of each group. Administrators can separate user files from business files. The drive has been partitioned and formatted with the ext2 file system. or cd /var/spool/Tom. Question: 319 Which Linux file shows which users have access to which groups? A. D: /etc/users does not contain group information. you would have to enter the command: cd /. She is complaining that the new drive must be mounted manually every time the computer is booted. It does not keep you in the current directory. Question: 321 A customer has installed a new IDE hard drive in a Linux system. Page 118 of 217 . /etc/group D.

B. using the man pages is quicker. inetd. You can access the manual pages using the 'man' command. B: The HOWTO pages are very useful. Incorrect Answers B: No drive module needs to be added to the kernel as the filesystem can be mounted manually. Add the drive information to the /dev directory.conf D. Search the distribution documentation CD. rc. Use the built-in manual pages by typing "man route". D: It is not necessary to change the runlevel. Smith. Where could this be configured? A. not the help command.html Incorrect Answers A: Searching the distribution documentation CD (if there is one) would be a long way of doing it. you would type 'man route'. Sybex Linux + Study Guide: Page 400/1.oreillynet. View the HOWTO pages on the Web browser. Reference: http://www. Change the runlevel to reflect the number of partitions in the system. This information includes who can mount the filesystems and whether the filesystem should be mounted automatically at system bootup. The manual pages contain information about various commands including the syntax and the correct usage for each command. Explanation: Every system has manual pages installed by default.local B. Page 119 of 217 . Use the built-in help pages by typing "help route". C: The drive information must already be in the /dev directory as the filesystem can be mounted manually. Answer: A. D.bashrc C. To display information about the route command. D. Answer: D. Explanation: The fstab file contains information about the filesystems. Question: 323 A user wants to have a custom software daemon run each time the system starts. Reference: Roderick W. Question: 322 A technician discovers that the route command is being used incorrectly. ~/. Which of the following resources is the quickest means of finding examples of correct usage? A. However. C: The 'help' pages are known as manual pages and can be accessed using the 'man' command.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C. /etc/profile Answer: A.com/linux/cmd/m/man. C.

It is not used to start daemons. Question: 325 At boot time. B. Answer: B Explanation: Page 120 of 217 .local is a startup script that can be configured to start processes or daemons when the system boots up.html Incorrect Answers A: The dd utility cannot be used to locate system log files. Sybex Linux + Study Guide: Page 394. To create a bootable Linux system disk.oreillynet. Question: 324 For which of the following reasons could the dd utility be used? A. To automate editing system configuration files. Smith. C.conf is used to configure the inet daemon. The file system has become corrupt and needs to be repaired. it is better to use the rc.local file. C: Inetd. To automate access to system hardware information. D. Inetd could be used to start the custom daemon. Incorrect Answers B: The bashrc file is used to set environment variables for the BASH shell. B.com/linux/cmd/d/dd. You could use this to read information about hardware by taking input from the hardware configuration files and output this information to a single file. and therefore should be manually entered into the files. The drive is configured using an improper file system and needs to be reformatted.local file exists in the /etc directory or a script subdirectory such as /etc/rc. What is the problem. To locate and access system log files. The boot sector is corrupt and needs to be replaced. D. The rc. B: The dd utility cannot be used to create a Linux system disk. Inetd starts server processes when they are requested.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Explanation: Rc. It is not used to start daemons. but it won't start the daemon until it receives a request for it. D: The /etc/profile file is used to set defaults for environment variables. Reference: http://www. The partition table has become corrupt and needs to be repaired. Reference: Roderick W. C: Editing system configuration files cannot be automated because the configuration information would be different each time. and how is it corrected? A. the computer reported that there are problems with inodes and blocks.d. Answer: D. For this reason. Explanation: The 'dd' utility is used to take input from an input file (IF) and output to an output file (OF). C.

Which of the following commands should be used? A. C: If the partition table had become corrupt. This would not result in inode or block error messages.uwinnipeg. Reference: http://theory. B: It is possible that the keyboard is faulty. C. Explanation: Netstat is a TCP/IP command used to show the network status. C: You would check to see if root can log in if you were sure you're password is correct and the Caps Lock is off.ca/faqs/section4. but it is more likely that the Caps Lock is on. tftp B. you would not get errors related to a corrupted filesystem because the filesystem hasn't been read yet. You should use a disk repair utility such as fsck to attempt to recover the filesystem. the remote address and port. Check to see if root can login. netstat Answer: D. the port number. Incorrect Answers A: Restarting the machine won't affect someone's ability to log on if their password is wrong. D. The most common cause of logon failure due to a rejected password is the keyboard Caps Lock being on. Answer: D.com/linux/cmd/n/netstat. B. lsport C. Reference: http://www. This can be caused by improperly shutting down the machine. For all active sockets. the number of bytes to be sent. Question: 326 A user is attempting to login to a Linux machine but her password keeps getting rejected. Reboot the machine. minicom D.html Incorrect Answers A: If the boot sector was corrupt. the boot loader would not be able to run. and the state of the socket.oreillynet. Explanation: Passwords are case sensitive. Question: 327 A customer wants to determine which TCP ports are in use on his Linux server. Which of the following actions should be done first to try to solve the problem? A. Therefore. the most likely problem is that you have a corrupted file system. The -t option with Netstat is used to display just the TCP ports. Replace the keyboard. Check to see if <Caps Lock> is on.html Incorrect Answers Page 121 of 217 . the number of bytes waiting to be received. the system would not be able to find the partitions. it will print the protocol.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 If you get errors about inodes and blocks during system boot up.

then you would know that the backup was unsuccessful. C. However. not to display TCP port information.html Incorrect Answers A: /boot does not contain the messages displayed at boot time. Running a diagnostic of the tape drive is probably the least helpful of the answers given. the first thing you should do it to check the log files. B: The dmesg utility can be used to display boot messages. to display the currently running processes.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A: TFTP (Trivial File Transfer Protocol) is used to transfer files. If the tape drive failed the diagnostics. B: Performing a test restore is a good way of testing a successful backup. You should also test the backup by performing a test restore and inspect the tape media. C. Incorrect Answers A: Viewing the log file is the first thing you should do. not TCP ports. B. B: Lsport is used to list printer ports. Explanation: If you are concerned about possible errors during a backup operation. The tape drive may pass the diagnostics. D.d and run "whatis -x". Which of the following is the LEAST helpful in determining that a successful backup was performed? A. examine /var/log/dmesg and run "ps -e". you need to use the ax options with the ps command. C: Minicom is a utility used for connection modem dial up connections. Perform a test restore. How should he look for this information? A. examine /boot and run "ps-ef". B. View the log file. This will include the services being started at boot time. Run a diagnostic of the tape drive. Question: 328 An operator is concerned that errors occurred during the last tape backup. D: Inspecting the tape media should be done as tapes do wear out after a while. Answer: D Explanation: The /var/log/boot. examine /etc/init. Question: 329 A customer wants to identify all of the services that were initially loaded by his server upon boot and compare these with services that are currently running. Answer: C.oreillynet. D.log and run "ps -ax".log file will contain all the messages displayed at boot time (plus any other system messages). Inspect the tape media with appropriate utilities. If the tape media proves to be faulty or the restore fails. The ps -ax command will display all currently running processes. but that wouldn't guarantee that the backup was successful. examine /var/log/boot. it still doesn't necessarily mean that the backup was unsuccessful. Page 122 of 217 . Reference: http://www.com/linux/cmd/p/ps.

If any occurrences of http are found.html Incorrect Answers A: The finger command is used to display information about users. Page 123 of 217 . Question: 330 A user is trying to connect to a system via HTTP. B: The 'restart httpd' command incorrect. View /var/messages to verify that the service started. not about processes. Reference: http://www. Reference: http://www. Answer: D. C. Run "rpm -initdb". C. This information would be in /var/log/boot. D: /var/messages is the wrong file to verify that the service started. D. then you know that http is running. Copy the package to the directory /var/lib/rpm/.yolinux. 'Httpd restart' would restart the httpd process. Run "ps aux | grep http". The grep http command will take the output from the ps aux command and search it for any occurrences of 'http'. but it isn't used to tell you if the process is currently running.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C: Whatis is not used to display the currently running processes. Answer: C. How could an administrator verify that HTTP services are running after a default installation? A. Question: 331 The administrator uses the rpm command to install a new software package but he gets the following error message: cannotget exclusive lock on database error:cannot open /var/lib/rpm/packages.com/linux/cmd/p/ps. The output of this command is then handed to the grep command using the pipe (|) redirector.com/TUTORIALS/LinuxTutorialSysAdmin. Run "restart httpd". Explanation: The ps aux command is used to list all currently running processes. This is not necessary. B. Run "rpm -rebuilddb".html#RPM Incorrect Answers A: "rpm -initdb" is used to build a new database. B. Check whether a second instance of rpm is already running. Run "finger http". Explanation: The error stated in the question is usually caused by another instance of rpm already running. Killing the other rpm instance should solve the problem.oreillynet.rpm What is the best way to solve the problem? A.log. D.

This indicates that LILO is installed. C: The error "cannot open /var/lib/rpm/packages. Answer: D. What does this indicate? A. Using the > redirector.htm?link Incorrect Answers A: LI was displayed. The second stage bootloader was unable to start. C: If the hard drive wasn't functioning properly. Question: 332 What is the quickest way to create a file that lists all the groups to which the user 'bob' belongs? A . it is unlikely that the first stage of LILO (LI) would be able to run. This may solve the problem but it is not the first thing you should try.txt C .cc/howto/liloerrorshowto. B: LI being displayed has nothing to do with the video driver. Reference: http://www.find /etc/passwd bob >> bob_groups.txt Answer: B. the file bob_groups. D. The only thing wrong with the command is that is has two redirectors together ( | followed by >).txt D . it indicates that the first stage boot loader was able to load the second stage boot loader. Reference: http://www.grep bob /etc/group > bob_groups.txt using the > command redirector.htm Incorrect Answers A: The whereis command is used to locate the binary file and man pages for a command.linuxpeople. LILO is not installed.where is bob >> bob_groups. The output of this command is placed into a file name bob_groups.hu/doc/LinuxShellScript/rpf. B. Explanation: If LI is displayed during bootup. not to find occurrences of a string within a file. The video driver is corrupted. D: This command would almost work but it is a long way of doing it. but has failed to execute it. The hard drive is not functioning properly.html http://www. C: The find command is used to find files.txt will be created if it doesn't already exist.txt B . cat groups | grep bob | vi > bob_groups.netti. Otherwise. you would get an error saying it couldn't find the file.in this case bob in the /etc/group file.com/linux/cmd/g/grep.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B: "rpm -rebuilddb" is used to rebuild an existing database. Page 124 of 217 .oreillynet.cd /etc. Question: 333 A Linux system boots up with only "LI" instead of LILO. Explanation: The grep command is used to search files for occurrences of a string . C.rpm" suggests that the package exists in the directory.

Therefore. Answer: C. wtmp B. The kernel swapped the identification of the NICs causing neither to operate properly. boot. it is unlikely to be a motherboard problem. After the network services are restarted.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 334 A system with an existing Linux installation has an onboard network interface already configured as 'eth0' that is functioning properly. Explanation: The most likely cause of the problem is that both network cards are configured with the same IP address thus causing a conflict. Question: 335 The server has been rebooted after a kernel panic. B: Dmesg displays the kernel messages displayed at bootup. An IP conflict between the cards caused networking services to fail at boot.log file may contain some indication of the problem. It is not possible to run an onboard and expansion NIC in the same PC.log D. The /var/log/messages file will contain error messages generated by the kernel before the machine was rebooted. Examining this file might give some indication of the problem. the correct drivers are installed and are supported by the kernel. D: It is very unlikely that the kernel would swap the identification of the NICs. neither network interface device has network connectivity. Which of the following files can be viewed to try to determine the problem? A. B: It is possible to run an onboard and expansion NIC in the same PC. dmesg C. D. What is the problem? A. Question: 336 Using which of the following commands creates a risk of destroying data on a mounted file system? Page 125 of 217 . messages Answer: D ? Explanation: The boot. Reference: Roderick W. Sybex Linux + Study Guide: Page 609. /var/log/messages would be the first file to look at to determine the problem. Incorrect Answers A: Both network cards have link lights. B. Both devices have link lights. /var/log/messages would be the first file to look at to determine the problem. A motherboard defect caused both cards to stop functioning properly. Therefore. however. A PCI network interface card is inserted into an empty PCI slot and configured as 'eth1'. There is no error message generated. C: The boot. C. Incorrect Answers A: The wtmp file contains information about logins. Smith. We need to see the error messages generated before the reboot.log file contains system messages.

D: Setserial is a program designed to set and/or report the configuration information associated with a serial port. Although this can cause problems if the filesystem is mounted as read only. Question: 338 Which of the following is NOT a valid SCSI connector? Page 126 of 217 . Try to modify the configuration files. Running this command on a filesystem that is already mounted would just generate an error message. Collect information. C: You need to know the cause of the problem before you can try to find a solution to the problem.html Incorrect Answers A: Fsck (file system checker) is used to check the file system for errors. Make a hypothesis about a solution. Explanation: The mkfs command is used to create a filesystem on a hardware device such as a hard disk or a mount point. Explanation: The first step in troubleshooting should always be to collect information about the problem. mkfs C. fsck B. Incorrect Answers B: You need to know the cause of the problem before you can test a solution to the problem.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. It would not cause the loss of data. setserial Answer: B. C. When you know the cause of the problem. and what the possible cause of the problem could be. Question: 337 What is the first step in troubleshooting a system problem? A. mount D. D: You need to know the cause of the problem so that you know what configuration changes to make. Creating a new filesystem over an existing filesystem will destroy the data on the existing filesystem. It would not cause the loss of data on a mounted filesystem. D. B. it is not as dangerous at the mkfs command. This information can determine whether the problem is hardware or software related.oreillynet. Reference: http://www. you can try to find a solution to the problem. C: The mount command is used to mount a filesystem.com/linux/cmd/m/mkfs. Answer: A. Test a possible solution.

net/html/scsi_connecters. SIPP Answer: B.htm Incorrect Answers A: This is a DB 25 connector.ramelectronics.uk/Products/Products. RIMM D. SIMM B. B: This is an HD 68 connector. Question: 339 Exhibit: Which of the following types of memory modules is shown in the exhibit? A.co.com/HD-DB-15. Explanation: The exhibit shows a 168 pin DIMM. DIMM C.orcalogic.html http://www. Reference: http://www. Reference: http://www.htm Page 127 of 217 .nullmodem. Explanation: This is a DB15 connector commonly used to connect to VGA monitors. D: This is a 50 pin Centronics connector.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: C.

freebsd. Sybex Linux + Study Guide: Page 145. Squid D. C: This is not a RIMM. It is not used for exporting or importing directories. Network Card Answer: C. C: Squid is a web proxy program. Question: 341 A medium-sized business wants to use GNOME or KDE.html Incorrect Answers B: TFTP (trivial file transfer protocol) is used to transfer files across a network. NFS B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Incorrect Answers A: This is not a SIMM. Exportfs Answer: A. It is not used for exporting or importing directories. Explanation: Gnome and KDE provide graphical desktop environments for Linux computers. Modem Card C. Which of the following hardware components is required? A. Video Card D. To use these graphical desktop environments. SCSI Card B. D: Exportfs is a command used to export directories. Smith. It is not needed to enable the use of Gnome or KDE. Question: 340 What Linux service is responsible for exporting and importing directories with another system on a network? A. and transport protocols. Incorrect Answers A: A SCSI card is required if you have SCSI devices. tftp C. However. Reference: http://www. Reference: Roderick W. The NFS protocol is designed to be portable across different machines. operating systems. network architectures. you will need a graphics card otherwise known as a video card. The Network Filesystem (NFS) protocol provides transparent remote access to shared files across networks. it is the NFS service that is responsible for the exporting and importing of directories.ISO8859-1/books/handbook/nfs. Explanation: The NFS service (Network File Service) is used to share directories on a network. D: This is not a SIPP. Page 128 of 217 .org/doc/en_US.

Reference: http://www. Pinging the server's IP address from a client is successful. DNS is used to map hostnames to IP addresses. BIND B.isc. portmap Answer: A. you have network connectivity.html Incorrect Answers A: A proxy server is used to provide an internet connection and web caching functionality. It is not used for name resolution. In this question. you can ping the server's IP address. Database Server C.org/linux/db. Messaging Server D. Application Server Answer: B. Question: 343 A client requires a system that is able to store all of his customer records and records of transactions.org/products/BIND/ Incorrect Answers B: Squid is a web proxy program. This information could be about anything. You are unable to ping the hostname which means you have a name resolution problem. but the new network is not working. It is used to start services on a Linux computer. Connection attempts from the clients to the hosts generate "unknown host" errors. Adding the DNS service (BIND) to the network will solve this problem. It is not needed to enable the use of Gnome or KDE. It is not needed to enable the use of Gnome or KDE. Squid C. a common use of a database is to store customer information. that can be accessed by workstations on the network. Explanation: BIND (Berkeley Internet Name Daemon) is a common type of DNS service. xinetd D. therefore. What type of server should the client implement? A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B: A modem card is required if you want a dial up connection (to an ISP for example). A database server is a network server hosting a database. Explanation: A database is used to store information. Reference: http://linas. Question: 342 A customer installed a new intranet in their company. What service needs to be added to the network to fix this issue? A. However. It is not used to store customer information. Proxy Server B. Page 129 of 217 . D: Portmap is used with NFS to mount filesystems. D: A network card is required if you want to connect to a LAN (local area network). C: Xinetd is the Linux 'superserver'.

C.oreillynet.html Incorrect Answers A: The ifconfig command displays the IP address. B. It is not used to store customer information. It is easier to use the top command to display just the most CPU-intensive processes. Ip address B. it does not display the processes with the highest priority. D. Active network interface Answer: C. What should be done to find the processes that are using the most resources? A.com/linux/cmd/t/top. B: The ifconfig command displays the MAC address. killing or restarting the process may improve system performance. Reference: http://www. Explanation: The 'top' command is used to display information (frequently refreshed) about the most CPUintensive processes currently running. the hardware (MAC) address. and the active network interface. Question: 344 Which of the following information is NOT returned by ifconfig on a machine connected to an Ethernet network? A. B: The ps a command will list all running processes. Use the command "ps a" to list the top five processes with the highest priority.html Incorrect Answers A: The renice command can be used to adjust the priority of a process. Mac address C. However. It is not used to store customer information. If a process is using an excessive amount of CPU time. Explanation: The ifconfig command is used to configure a network interface or to obtain information about the network interface. Answer: D. Page 130 of 217 . Question: 345 The system administrator notices that the system is running slow. Use the command "jobs" to give a constantly updated list of CPU-intensive processes.oreillynet. Use the command "top" to give a real-time updated list of processes ranked by CPU usage. Computer hostname D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C: A messaging server is used to provide messaging functionality on a network. it does not display the hostname of the computer. D: The ifconfig command displays information about the active interface including packets received/sent. Reference: http://www. D: An application server is used to provide access to applications to workstations on a network. However. The information includes the IP address.com/linux/cmd/i/ifconfig. Use the command "renice" to show the processes with the highest priority. C: The 'jobs' command to not display a constantly updated list of CPU-intensive processes.

fsck B. The -l option is used to display information about all the hard disk partitions. Reference: Roderick W. However. fsck -l D.rt.rpm D.rpm Answer: B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 346 Which of the following commands is used to obtain the summary of hard disk partitions? A. Smith.5i386 rpm C. Explanation: The fdisk command is used to create/view hard disk partitions. a package with the same name must not already exist on the system. Question: 348 An assistant network administrator has just been assigned the task of performing a daily check of the security system.rpm" to the original rpm package? A.rpm B. C: Fsck is used to check the filesystem for errors. C: The i option is used to install a package.5. Incorrect Answers A: The qa options are used to query the installed packages. It is not used to display partition information. This will display information such as the installed files for the package.5. fdisk -l Answer: D. Explanation: The U option used with rpm is used to install a package or upgrade an existing package. The fdisk command on it's own does not display partition information.i386. The v and h options are used to display a series of pound signs (#) to indicate the progress of the installation/upgrade. Reference: http://www.i386. when using the i option to install a package. rpm --update package-update-3. Question: 347 Which of the following can be used to apply the package "package-update-3.i396. rpm-Uvh package-update-3. It is not used to display partition information. fdisk C. A script will be created that will be executed daily as a cron job. listing various options.i386. Which of the following commands can be included in the script which directly relates to enhancing and checking the system security? Page 131 of 217 . rpm -ivh package-update-3.5. B: The fdisk command with no options will start a menu driven program.html Incorrect Answers A: Fsck is used to check the filesystem for errors. Sybex Linux + Study Guide: Page 178/9.8.5.com/man/fdisk. rpm -qa package-update-3. D: Update is not the correct option to upgrade the package.

html Incorrect Answers A: This command would search / (the root directory) for any (*) filename and list the output in the /var/log/daily file. New users added to the system. grep -Ril root /ect/* >> /var/log/daily Answer: C. Question: 350 The /etc/passwd file for a Linux system has an "x" in the second field. Explanation: Documenting work performed on a server is very important for troubleshooting purposes. A list of user accounts can be obtained at any time. Explanation: Setuid executable files can be run as the file owner rather than the user running the file. D: This command would search every file in /etc/ for an occurrence of the word root. This can be a security risk as it could give an intruder root access to your system. What does this indicate? A. It is often helpful to know the exact version of your hardware drivers. B. find /-name * >> /var/log/daily B. However. This will make it easier for an administrator to know if he/she has the most recent version of the drivers. This doesn't improve security. This would result in a list of every file on the system. It cannot be used to enhance security. just noting any file system errors would suffice. B. chmod -R 4000 / >> /var/log/daily C. The output of the search is appended to a file called /var/log/daily with the >> redirector. Reference: http://www. You can use the find / -perm 4000 command to search for setuid files. The system is using shadow passwords. Updates of user passwords. C. D: Documenting file system check times could be useful as it could indicate a deteriorating hard disk. B: The chmod command is used to change the permissions on files (in this case. D. File system check times and results. Incorrect Answers B: Documenting updates to user passwords is not necessary. The user is configured for X login. Answer: A. C. Updates to hardware drivers. every file on the system). The user is required to change the password at next login.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A.com/projects/LinuxConfig/LinuxConfig-4. Page 132 of 217 .intersectalliance. find / -perm 4000 >> /var/log/daily D.0. D. Documenting the actual passwords is definitely not recommended. Question: 349 An administrator needs to maintain a log of work performed on a Linux server. The user account is disabled. Which of the following written records is the most important to maintain? A. C: Documenting new users is not necessary.

conf file on each server so log files are forwarded to 'loghost'. Explanation: To delete the files. B. Log in as superuser and delete the files manually. What is the industry-recommended method to do this? A. Create a new server called 'loghost'. Others place the encrypted password in this field. she must have the necessary permissions on all the files. and successfully delete all the files. Answer: B. Explanation: Page 133 of 217 . This will make the cron job run with root permissions.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: C. Question: 352 A system administrator of a 200-server network wants to simplify routine monitoring of log files on each server. D. Linux distributions that use shadow password files typically place an 'x' in this field. she notices several days later that some of the files have not been deleted. However. Incorrect Answers A: If she used a shell script. Create a script on the administrator's workstation to attach to each server and copy its log files to the local drive. Explanation: The second field is the password field. D: Editing the crontab won't make the cron job run with root permissions. Run logcp at each server. Question: 351 A user creates a cron job that deletes all files in /tmp and /var/tmp on her home machine each night. C: Deleting the files manually is unnecessary. B: The x does not mean the account is configured for an X login. Incorrect Answers A: If the user account was disabled. the password field would contain a '*'. Modify the syslog. Reference: Roderick W. What can she do so the cron job performs correctly? A. C. D. To ensure she has the necessary permissions. Create a script on each server to analyze each of the log files on the server and forward important information to the administrator's workstation. C. she should make a new crontab while logged in as root. Write a shell script to remove the files. Make a new crontab while logged in as root. Specify the administrators workstation as the destination and "*" for which log files to forward. Edit her user crontab while logged in as superuser. Sybex Linux + Study Guide: Page 273. Smith. B. D: The x does not mean the user is required to change the password at next login. she would still need the necessary permissions to delete the files. Answer: B.

." is an indication of possible file corruption. Someone must have created it. You can modify the syslog...." was created by a normal system process at login. Page 134 of 217 . C: The '.. Therefore. Incorrect Answers A: You shouldn't store important log files on a workstation.login" files.' (2 dots) refers to the parent directory.." refers to the parent directory.. Answer: D. C: Editing the login files will not enable a user to run a program as root. '. Which of the following will allow that to happen? A. C: This would have to be done every time you wanted the logs copied to your machine.conf file on each server to configure the servers to save their log files on the central logging server. D. D: A '. Lock the directory and examine its contents to determine if this is a security risk. Answer: B.. Run " . Run fsck on the /home partition because the ". B.' does not refer to the parent directory. Sybex Linux + Study Guide: Page 254. However. Question: 353 A user tells the administrator that he has found the entry ".. Reference: Roderick W.. Explanation: The '. and tells Linux to run the program with the permissions of whoever owns the files.' directory isn't created by a process at login. and he did not create this entry. you should use a central logging server.. C. Which of the following actions should the administrator take and why? A. Edit the users ".' directory is not created by default.. B. the syntax in this answer is incorrect. B: The chroot command is not used to run a command as root.. D... you should lock the directory and examine its contents to determine if this is a security risk.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 To simplify the monitoring of log files./run_file -su root". Leave the directory as it is because ". if the root user owns the file.. For example. Incorrect Answers A: The su command is used to 'switch user' and open a shell with the permissions of that user." in his home directory. Smith. Explanation: The Set User ID (SUID) option is used in conjunction with executable files. Leave the directory as it is because the ". Use the chrootcommand. D: It would be difficult to define 'important information' in a script.. Question: 354 Users on a machine need to run the command run_file that requires superuser permissions in order to write to other files. rather than with the permissions of whoever runs the file. Change run_fileto a SUID command. Incorrect Answers A: '.' directory doesn't indicate possible file system corruption. the file will run with root permissions when any user runs the file. C.

B: Zcat is not used to create an archive. it is still not the easiest way to preserve an original copy of a file. Answer: C. Which of the following is the best way to do this? A. not to compress them. the Update Protection Utility in X to protect the original file or kernel. type "cp <original file or kernel name> <original file or kernel name>.oreillynet. when issued. Answer: C. The z option invokes the gzip utility to compress the files as part of the archive creation process. Explanation: The best way to preserve the original version of a file or kernel is to make a backup of it. Reference: http://www. Use zcat to compress all of the files and then tar to create an archive. Explanation: Tar is the best utility to use to create an archive containing multiple files. The easiest way to create a backup of a file is to make a copy of it.oreillynet. From the directory containing the file to be backed up. Now he would like to backup the programs to his home computer by creating a compressed archive and then using ftp to transfer the data to his computer at home. It is used to list the contents of an archive. Reference: http://www. D: Files and kernels can be preserved by making a backup copy of them. C. Files and kernels cannot be saved because the updates will permanently overwrite the originals by default to eliminate the possibility of version conflicts.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 355 A user has accumulated over 500 MB of programs stored in 25 directories. Question: 356 How can an original file or kernel be preserved before being updated or patched on a Linux system? A. D: Zcat is not used to compressed files. C. Use gunzip to create a compressed form for each file. The command to copy a file is 'cp'. Use tar with the "z" option to create a compressed archive in one step.html Incorrect Answers A: Gunzip is used to uncompress files.com/linux/cmd/c/cp. D. It is used to list the contents of an archive. Use the upu.bak". B. if the utility exists. protects a file named classic from being deleted by root? Page 135 of 217 . Edit the /etc/profile/changelog file and add the filename or kernel version to be backed up. which is saved in /usr/src.com/linux/cmd/t/tar. B: I don't know if there is an 'Update Protection Utility'. However.html Incorrect Answers A: Editing the /etc/profile/changelog won't preserve an original copy of a file. B. Use zcat to create an archive and use gzip to compress the archive. Question: 357 Which of the following commands. D.

which was started by root. C. and the process with PID number 392 will be terminated. A user will kill the process named 392. A user is given root-level permissions. Question: 359 Which of the following lines of text. Question: 362 Page 136 of 217 . The installation type step. You want the Linux installation program to search for bad blocks. 2 5 * * 1 cleanup Answer: C. Answer: A. Apache B. The hard disk partitioning step. Squid Answer: C.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. 2 5 *1* cleanup B. 5 2 1 * * cleanup D. and the processes started in March of 1992 will be terminated. B. The Linux Loader (LILO) configuration step. The hard disk formatting step.M. Question: 360 Which of the following best describes what will occur when the su -c 'kill 392' root command is issued and a valid password is entered? A. D. iptables D. when added to the /etc/crontab file. BIND C. Which steps in the Linux installation process for most Linux distribution enables the installation program to search for bad blocks? A. chattr +c classic B. chmod 000 classic D. chmod a-rwx classic Answer: B. Answer: B Question: 361 Which of the following can you use if you want to configure a Linux computer only as a firewall? A. 5 2 1 1 * cleanup C. C. The root user will kill all of the processes that were started by root. Question: 358 You are installing the Linux operating system on a computer. will run the cleanup script on the first day of every month at 2:05 A. A user is given root-level permissions. D.? A. chattr +i classic C. B.

The name of each installed package will be displayed. Laser Printer C. D. There is a SCSI ID conflict. CardBus network card D. Question: 364 Which device normally uses a DMA channel? A. C. Question: 363 Which of the following statements best describes what will happen when the rpm .qa command is issued? A. The name of each file contained within a package will be displayed. USB Answer: B. Cable video tuner Answer: C Question: 365 A technician installs a SCSI card and three SCSI devices on a new system. COM3 C. C. COM2 B. AGP video card C. There is an Int13h conflict. All of the packages installed on the computer will be verified. B. The system does not recognize any of the SCSI devices or the controller. COM4 D. Detailed information about an installed package will be displayed. PCI modem B. B. ISA sound card D. PS/2 mouse B. D. Answer: C Question: 366 Which of the following devices are hot-swappable? A. There is an I/O address conflict. You want to connect an external modem to the computer. Parallel port printer Answer: C Question: 367 Page 137 of 217 .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Your Linux computer has a serial mouse on COM1. Connecting the modem to which of the following ports can cause the modem and mouse to malfunction? A. Answer: A. There are no Linux drivers installed. What is the most likely cause? A.

Perform a BIOS upgrade. C. 10BaseT Answer: D Question: 372 Based on the exhibit. in what type of I/O bus should the card shown be used? Page 138 of 217 . Reinstall the modem drivers. Reconfigure the COM ports. B. CMOS B. 10Base5 C. Mass storage devices D. The hard disk controller has no LBA capability. D. Power supplies C. POST C. Now. Modulater/demodulater Answer: C Question: 371 Unshielded twisted-pair is used for which of the following networks? A. CPUs B. Which of the following will most likely correct the problem? A. memory and video? A. DIOS D. Linux recognizes only 8 GB of the available disk space. The hard disk has to be low-level formatted to access the full capacity.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A user adds a serial trackball to his system. C. which test examines the CPU. D. During the installation process. neither the existing mouse nor the trackball work. Bootstrap Answer: B Question: 370 ATAPI technology is a standard for which of the following items? A. Answer: C Question: 368 A user replaces an old 4 GB IDE drive with a new 30 GB IDE drive. The value of the hard disk size in the CMOS is set incorrectly. The BIOS does not support larger hard drives. 10BaseF D. Which of the following is most likely the problem? A. 10Base2 B. Answer: A Question: 369 During a cold boot of a system. B. Reboot the system.

CPU fan B. Answer: B Question: 375 A new PC is delivered to the site. Onboard SCSI controller Answer: A Question: 374 The current BIOS version on two workstations does not support the processor that will be installed. Replace the old motherboard with a new one. Which of the following is the best way to resolve the problem? A. MicroChannel Answer: A Question: 373 Which of the following is a field replaceable unit? A. but the same motherboard with new BIOS version does. C. D. Lavel 1 cache D. Flash the BIOS with a binary or HEX file. The CPU is not seated properly. Update the CMOS using a HEX editor. D. Which of the following has most likely caused this problem? A. C. there is no video display. Answer: C Page 139 of 217 . The mouse is not connected. The diskette drive has failed. B. PCI bridge C. EISA D. ISA C. no beeps are heard.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A. PCI B. Use the debug command to copy the BIOS from a new motherboard. Upon the initial power up. B. The network card is not installed. but the hard drive and fans power up.

HD-68 D. B. what port would he use to connect a CAT5 cable to establish a connection on the network? A. A. D Answer: B Question: 379 Exhibit Page 140 of 217 . PS/2 C. What port on the workstation would be used? A. The software is not compatible with the hardware Answer: A Question: 377 A user has just purchased a new external modem and wants to install it on his Linux desktop workstation. A DIMM is failing B. C D. B C. USB B. When a user installs his new Linux desktop computer. The IRQ settings are incorrect D. RJ-11 Answer: A Question: 378 Exhibit Study the exhibit.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 376 Which of the following can a parity error indicate? A. The IDE hard drive is corrupt C.

B C. Both the hard drive and the CDROM drive D. Which of the following most likely caused the problem? A. and CDROM drive Answer: C Question: 381 A user installed a new hard drive into a system with an existing hard drive. The SCSI interface card only C. C D. The hard drive only B. C. D Answer: B Question: 380 What should be terminated on a SCSI bus with one internal hard drive and one external CDROM? A. B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Study the exhibit. hard drive. The SCSI controller. D. A user wants to install an external CDROM drive onto a system. The hard disk drive was not low-level formatted first. Which interface should be used? A. but the system did not boot. The ribbon cable was inserted backward on the hard disk. The hard disk needs a new MBR. A B. He powered on the computer. The controller was damaged by an electrical discharge. He then connected a ribbon cable to the new hard disk. Answer: D Question: 382 What is the difference between "shutdown -h now" and "init 0"? Page 141 of 217 .

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

A. "init 0" does not power down the Linux system B. "init 0" does not halt the system during power down C. "init 0" does not send a broadcast message to logged-in users D. "init 0" does not stop services before powering down the system. Answer: C Question: 383 An administrator recursively copies the /home directory to a new hard drive using the command cp -R /home /usr/home What further actions are required, if any, to make the files accessible to the users? A. Give executable permission to the users on the new home directory. B. Change ownership of the files, and assign directory permissions to users. C. Change ownership of the files; directory permissions are automatically assigned. D. No further action is required. All permissions are replicates using the cp command Answer: B Question: 384 Which of the following commands is issued to create the group 'sqleditors' on a system? A. group +sqleditors B. addgroup sqleditors C. groupadd sqleditors D. echo sqleditors:x:601: > /ets/groups Answer: C Question: 385 A software developer completed his annual report yesterday. He is now trying to print the report and submit it to his supervisor; however, he has forgotten the name and path of the report file. Which of the following commands can be used to obtain a listing of recently modified files? A. locate -t2 B. find / -mtime 2 C. whereis -time 2 D. grep / -ctime 2 Answer: B Question: 386 A user logs onto the system as root. He attempts to execute the script file a,sh. He is getting the message "Execute permission denied". What command must be used before the file can be executed? A. chgrp B. chown C. chmod D. execute Answer: C
Page 142 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

Question: 387 Which of the following commands creates a tar file called back.tar that contains all files ending with extension ".c" in the current directory? A. tar back.tar *.c B. tar xvf | *.tar *.c C. tar cvf back.tar *.c D. tar cvzf | *.tar *.c Answer: C Question: 388 Where are log files normally found? A. /bin B. /etc C. /tmp D. /var Answer: D Question: 389 A user wants to load a PDF file from the CDROM. What command would allow the user to access this file? A. mount -dos /dev/cdrom B. mnt /dev/cd0 /mount/cdrom C. mount -t vfat /mnt/cdrom /dev/cdrom D. mount -t iso9660 /dev/cdrom /mnt/cdrom Answer: D Question: 390 Which of the following commands can be used to place print jobs in the print queue? A. pr B. lpq C. lpr D. lprm Answer: C Question: 391 Which of the following strings indicate that the input of the program called printData should be redirected from the file calles "myData"? A. printData . myData B. printData > myData C. printData < myData D. printData | myData Answer: C Question: 392
Page 143 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

What is the most secure way to connect to a remote machine? A. ssh B. ftp C. http D. telnet Answer: A Question: 393 Which of the following commands will create 'bsmith' as a user in the group 'web_users'? A. useradd bsmith web_users B. useradd -g web_users bsmith C. useradd web_users bsmith D. groupadd -group web_users bsmith Answer: B Question: 394 A Linux system administrator has forgotten the root password. Which of the following would be the best way for the system administrator to gain access to the machine? A. Reinstall Linux. B. Enter runlevel 0 and run passwd. C. Reboot and use the mdrecovery utility. D. Reboot, enter Linux single-user mode and run passwd. Answer: D Question: 395 Which of the following commands kan be used to save and resume editing the file in the vi editor? A. :w B. :x C. :v D. :s! Answer: A Question: 396 How can the X Window manager be restarted? A. Press <Ctrl><Alt><Delete> B. Press <Ctrl><Alt><Backspace> C. Press <Ctrl><Alt><F5>, login, and type "startx" D. Change consoles and type the command "kill -9 X" Answer: B Question: 397 What information about the user does the "x" provide in the following line in the /etc/passwd file? chris:x:501:501:chris smith:/home/chris:/bin/bash A. The user is disabled.
Page 144 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

B. The user has no password. C. The user has a blank password. D. The user has a shadow password. Answer: D Question: 398 Which of the following commands should be used to move the file named John1 from the directory /home/j/john/temp to /home/j/john/save? A. mv /home/j/john/temp/john1 /home/j/john/save B. mv /home/j/john/save /home/j/john/temp/John1 C. mv /home/j/john/temp/John1 /home/j/john/save D. mv /home/j/john/save/john1 /home/j/john/temp Answer: C Question: 399 After completing an installation of Linux, the technician is asked to document the current configuration and place this in a public location. The technician documented the following items: 1. Administrator contact information 2. System network settings 3. Application configuration 4. Installed components Which of the following did the technician fail to include? A. The root password B. Disk partitioning scheme C. Location of common system files D. Cost of replacement system components Answer: B Question: 400 A system technician needs to determine with hardware modules are loaded on a particular Linux server. Which of the following commands will perform this task? A. lsmod B. modules C. insmod -list D. modprobe -list Answer: A Question: 401 Which of the following is the best way to change video resolution from 800x600 to 1024x768? A. Run xf86config to change the resolution. B. Reinstall Linux with more options for X Server. C. Reinstall X Server with support for the 1024x768 resolution. D. Restart X Server after typing "resolution=1024x768" as root.

Page 145 of 217

and IV only B.168. 53 C. The modem dials and connects.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: A Question: 402 A user tries to dial into his ISP.155.5 to eth0 as a second IP address C.5. I. II. but loses the connection after a few seconds. II. 110 Answer: D Question: 404 Below is a list of possible steps to take in order to change manually from the old IP address to new IP address of a computer. B. The log files indicate tat an "Authentication failed" error occurred. Which of the following is most likely to be the problem? A. The phone line is bad. Use ifconfig to enable the network interface using the new IP address III.155. It will replace the old broadcast address with 192. The user dialed the wrong phone number. Answer: D Question: 403 What port is commonly used by the POP3 protocol? A. II and V only C. Update the routing table with the new paths V. IV and V only Answer: A Question: 405 A user typed the following command on a machine: ifconfig eth0:1 192. B. Page 146 of 217 . D. It will replace the current IP address with 192. and IV only D. III.168. The wrong authentication protocol was used by PPP. Update the arp table with the new address IV.1 assigned to eth0? A.5.155. I. The ppp_auth kernel module is not loaded. Use insmod to insert a new driver Which of the steps are required? A. I. 25 B. 69 D. I.5 up What would be the effect of typing this on a machine that already has an address of 192. I.168.168.168. Use ifconfig to disable the network interface II. but the password in the configuration file on the client system is correct.155. It will assign 192. C.155.

February 3. which of the following actions should be taken to enable X to display after installation is complete? A. POP. C. /etc/fstab C. XF86Config B. /etc/vconsole Answer: C Question: 409 Which file can be edited to disable FTP.02. filesystem types.5 to the second physical Ethernet card. time 0300:02:03:2002 D. /boot/info D. timeset 1500. mount points. Identify the chipset on the video card and obtain the driver from the manufacturer.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. date 020315002002 B.conf Answer: C Question: 410 If a video card is not recognized by the X configuration utility during the installation process. /etc/inetd. 2002? A. Inspect the CMOS for information on the video card and install the drivers that came with the video card. /etc/inittab D. /ets/inittab C.conf D. /etc/inittab Answer: B Question: 407 Which of the following commands will set the current system time to 3:00 PM. /etc/ports B. /dev/info B.2002 Answer: A Question: 408 Which of the following is a configuration file that contains the system virtual console specifications? A. It will assign the address of 192.155. Page 147 of 217 . dateset 020320021500 C. Answer: B Question: 406 Which of the following files includes device names. Edit the /etc/inittab to boot the X Window System B. permissions and information about whether to mount the device at boot time? A. /etc/remote.03.168. /etc/profile C. and RSH services? A.

BIND. When a problem arises with one of the machine's services. Squid. lpq B. GRUB does not support passing of kernel boot options. lprm Answer: D Question: 413 Users contact the administrator and complains that they are unable to browse the Web. nslookup on a popular known site produces the following error: "Host/domain not found". B. tail sysinfo C. cat /var/log/syslog Answer: A Question: 415 A Linux system is used for various Internet services and remote user access. D. Samba. cat /var/log/spool D. GRUB does not have to be rewritten to the hard drive after changing the configuration file. dmesg B. lpr D. Name resolution is not taking place. Edit /etc/lilo. HTTPD. which of the following actions is the LEAST likely to disrupt other services on that machine? A. Answer: B Question: 411 What is the main difference. Kill a daemon B. if any. C. Which service needs to be restarted and why? A. lpc C. The WAN Web Servers are not responding Answer: B Question: 414 Which of the following commands can be run to gather specific information regarding the hardware in the system? A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. between GRUB and LILO? A. LILO does not support hard drives larger than 30 GB. There is none. C. Answer: C Question: 412 Which of the following commands is used to cancel print jobs? A. The file server is not responding. The proxy server is not responding.conf to include a boot message to the kernel pointing to the location of the video drivers. B. D. Reboot the machine Page 148 of 217 . while a ping to a known WAN IP address is successful.

touch dhcpd. Check to see if his account is active. Check to see if <Caps Lock> is on. /root/. Disable a network device Answer: A Question: 416 A user calls into the support line and reports that he is unable to unlock his desktop. ssh_config B. Page 149 of 217 . pam_deny. What is the best way to resolve this? A. chkconfig --level 3 dhcpd on Answer: C Question: 420 The Linux system has experienced a power failure. it hangs with file system corruption messages. -c Answer: B Question: 419 The Linux system is not assigning IP addresses to client systems. he is sure that he has entered his password correctly. After several attempts.leases D. c B. .so C./dhspd start B. /z D. sshd_config D.ssh/allowed_connections Answer: C Question: 418 tar automatically compresses and decompresses using which of the following options? A. What is the first thing to do to troubleshoot this situation? A. Check if he has a valid password. Boot into single-user mode and run fsck. D. Answer: B Question: 417 A system will not allow root to ssh into the system. B. All others can connect via ssh. the problem is not corrected. C. . z C. Change his password. Which of the following configuration files should be edited to permit connection as the root user? A./dhcpd restart C. After the system is booted up. After changing to the correct directory.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C. Change to runlevel 1 D. After a reboot and executing the command "dhcpd start". which of the following commands should be used to permit IP addresses to be assigned? A.

Boot Linux with a boot diskette and type "lilo" Answer: D Question: 424 Which of the following commands is most useful to determine whether an Ethernet card problem is caused by hardware or the Linux kernel? A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B. Boot into multi-user mode and run "/sbin/shutdown -t3 -r now". the following error occurs: Error: Can't open display What most likely led to this error? A. It is the wrong version of the application. The application was compiled with the wrong graphics library. init and ps B. The administrator has used "su -" to log into the current account. route and ping C. dmesg and ifconfig D. /? B. Boot DOS with a boot diskette and type "lilo" D. D. -h C. Boot into multi-user mode and run chkdsk. Boot Linux and type "fdisk /MBR" B. Answer: A Question: 421 Which of the following is a common switch used to display command syntax for most programs? A. Answer: D Question: 423 Which of the following would correct a corrupt master boot record and allow a clean boot into Linux? A. Boot into single-user mode and run mdrecoveryd. C. kupdate and mprobe Answer: C Question: 425 Page 150 of 217 . D. --man D. B. Boot any OS and type "fdisk /MBR" C. C. The application is not an X application. -help Answer: B Question: 422 While attempting to start an application in an X Window System environment.

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

A system is configured to dual-boot Linux with another operating system that is located on /dev/hda1. LILO is the choosen boot manager. The system reboots without access to the other operating system. What lines should be added to lilo.conf to allow access to the other operating system? A. table = LILO label = <shortened name of operating system> other = /dev/hda B. O/S = <shortened name of operating system> location = /dev/hda1 bootmgr = LILO C. label = /dev/hda1 table = /dev/had other = <shortened name of operating system> D. other = /dev/hda1 label = <shortened name of operating system> table = /dev/hda Answer: D Question: 426 "netstat -i" is typed at the command line. All of the following information will be displayed EXCEPT A. Transmission errors for each network interface B. The number of packets dropped for each network interface C. The number of packets received for each network interface D. A list of masqueraded connections for each network interface Answer: D Question: 427 Which of the following commands would be used to watch the mail log for errors? A. locate B. tail -f C. monitor -f D. cat mail.log Answer: B Question: 428 Linux is being installed on a system that uses SCSI hardware. During partitioning, an error is produced that says there are no valid devices found on which to install partitions. The hard drive spins up. The SCSI controller is functioning properly and supported by Linux. The cable is a known good cable and there is proper termination. What is the problem? A. The SCSI hard drive is not jumpered to the proper SCSI ID. B. The SCSI controller needs to be reset to factory defaults. C. The SCSI controller on the hard drive needs a firmware update. D. The SCSI controller on the hard drive has an intermittent problem. Answer: A

Page 151 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

Question: 429 What command is used to access the information about memory availability and usage in Linux? A. cat /dev/meminfo B. cat /var/log/mem C. cat /proc/meminfo D. cat /etc/memory/usage Answer: C Question: 430 A customer has installed a new hard drive on a Linux system. What would be the order of tasks to allow her to put her MP3 collection on the new drive? A. fsck,mount,mkfs B. mount,mkfs,chkfs C. cfdir,mkfs,mount D. mkfs,mount,fschk,cp Answer: C Question: 431 A system administrator complains that a user's system has been forwarding unsolicited email (spam) to mass email lists. Which of the following actions needs to be done to sendmail to stop the spam? A. Change the firewall rules. B. Restart the sendmail daemon. C. Restrict relay domains in the sendmail configuration. D. Change the SMTP mail server in the sendmail configuration. Answer: C Question: 432 What is the purpose of cron? A. Manage incoming and outgoing mail B. Runs specified commands at defined times C. Sets the system clock to a specified time D. Changes the permission settings on a file or directory Answer: B Question: 433 Which command will extract the file "backup-4-19-2001.tgz"? A. unzip backup-4-19-2001.tgz B. tar xf backup-4-19-2001.tgz C. tar xzf backup-4-19-2001.tgz D. uncompress backup-4-19-2001.tgz Answer: C Question: 434

Page 152 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

A user calls the help desk, complaining that upon issuing a command to list files in her home directory, a "permission denied" error is received. Which of the following actions should be taken to resolv the problem? A. Delete the user's home directory and re-create it. B. Ask the user for some patience while the server is rebooted. C. Run "chmod 007" on the user's home directory and have the user try again. D. Check the UID:GID of the user's home directory and change it if necessary. Answer: D Question: 435 Which of the following types of backup minimizes system downtime during restore? A. FDD backup B. Full backup C. Incremental backup D. Differential Backup Answer: B Question: 436 A system administrator routinely needs to see the list of who has logged in and out on a machine, as well as their login times. Which of the following commands searches the "/var/log/wtmp" file and displays who has logged onto the machine and when they logged on? A. who B. last C. log -l D. wtmplst Answer: B Question: 437 A user who wants the status listing of all network interfaces will use which of the following commands to obtain this information? A. ifconfig -a B. ifconfig up C. ifconfig eth* D. ifconfig --all Answer: A Question: 438 A Linux superuser is unable to delete a file. The user is also unable to change permission for the file. What is the problem? A. The file is actually a hard link. B. The file has the immutable flag set. C. The file has been fragmented across directories. D. The superuser does not have permission to access the file. Answer: B
Page 153 of 217

Exam Name: Exam Type: Exam Code:

Linux+ CompTIA XK0-002

Total Questions:

736

Question: 439 Which of the following packages helps to identify a bad password? A. CERT B. Hack C. Crack D. Tiger Answer: C Question: 440 Which of the following commands will list all rpm packages installed on the system? A. rpm -d B. rpm -i C. rpm -qa D. rpm -Uvh Answer: C Question: 441 The system technicians and administrators at a facility are poor at keeping maintenance records up-to-date. The administrator decides to keep only the minimum information in the records and require that it be updated. Which of the following information is the most important to maintain? A. Dates and times that the server was rebooted B. Version numbers of patches applied to services C. Information about new users added to the system D. Records of which administrators have logged in to the system Answer: B Question: 442 The system administrator needs to examine the processes that the user with the login of 'john' currently owns. Which of the following commands would best do this? A. ps john B. ps -r john C. ps -U john D. ps -all | grep john Answer: C Question: 443 What Linux service is responsible for successfully sharing files over a NetBios network? A. NFS B. Samba C. XFree86 D. Xwindows Answer: B Question: 444
Page 154 of 217

C. The workstations use only the Netware client software to communicate with the server and to share data.12). NetBIOS C. B. Apple Talk Page 155 of 217 . Verify that SCSI emulation is activated in the kernel.19-2 be an INAPPROPRIATE kernel for a production web server? A. C. D. IPX/SPX D. Firewall B. ext2 allows only 8 character file names. D. Use the man pages to verify there is a SCSI module available for the controller. It needs to be upgraded to Kernetl 2.3. The SCSI controller manufacturer is out of business. Answer: B Question: 448 A Linux workstation is being integrated into a network that uses older Novell Netware servers (version 2. Use the kernel editor to vierify there is a SCSI module installed for the controller. Which of the following protocols should be installed on the Linux workstation? A. Answer: B Question: 446 A customer is concerned about attacks to his network from the Internet. ReiserFS has built-in USB file system support. What type of server does the customer require? A. Web Server C. It is a test version of the kernel. There are no differences between ext2 and ReiserFS. B. It is not the most recent kernel available. System Management Server Answer: A Question: 447 During installation of a Linux system. What is the most likely reason for this choice? A.3. TCP/IP B. B. This version of the Linux kernel has a known problem with Apache.20 for network support.2 and 3. Answer: A Question: 445 A customer wants to upgrade an old UNIX server to a current version of a Linux OS. The customer wants a system that will prevent unauthorized intrusion from outside his network. Use the Linux distribution Hardware Compability List to verify that the controller is supported. the customer decided to use the ReiserFS file system rather than ext2. D. ReiserFS allows partitions to be journaled. C. Database Server D.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Why would Kernel 2. What should be done to verify that the SCSI controller will work with Linux? A.

rpm C. The DNS service need to be validated before bringing the server into production. Run traceroute to the DNS server and analyze the hops. Run "rpm --verify <package_name>" C. The installation is corrupt and must be reinstalled C. /sbin/loadlin D. After editing the necessary configuration files. make D. install Answer: C Question: 451 The system administrator has just completed the installation and configuration of a DNS server to be used for external name resolution. GRUB is not being used as the boot loader. What would be the best method to validate the proper operation of the service? A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: C Question: 449 A customer has recompiled his kernel to a new image including new modules. Run the dig command for an external domain name. B. what command should be issued? A. Ping an external IP address. Validate that kernel. Run "verify <package_name>" B. Get a Web page from within the local area network. /sbin/lilo C. C. /etc/lilo B. run B. Answer: C Question: 452 A package that a user installed has never run successfully and returns a large number of errors. . A module is corrupted and must e reinstalled B. Validate that the /boot directory exists D. What is the first action that should be taken? A.lib is the correct version Answer: C Question: 453 An error message appears that states that no modular support is available. Page 156 of 217 ./start kernel Answer: B Question: 450 What command is commonly issued to compile and install an application from its source code? A. What caused this error message? A. D. A device being installed is not functioning and must be replaced.

mount/dev/uda1 /mnt/usb D . Answer: Pending. LasVegas Answer: A Question: 457 Which of the following packages is usually more important for a "workstation" installation than a "server" installation? A. What changes have been made on the server? A. C. Which of the following commands must be run to partition the disk? A. User passwords are now kept in the /etc/shadow file. fdisk /dev/sd2 Answer: Pending. 76range D. XFree86 Server Answer: D Question: 458 Which of the following commands will mount a USB flash drive successfully in Linux? A . fdisk /dev/sdb D. Send your suggestions at feedback@Examsheets. Proxy Server D.net Question: 455 During installation of a new server. Send your suggestions at feedback@Examsheets. xpF57se B. range76 C. B. The maximum password length is now 64 characters. fdisk /dev/hdb B. Access to /etc/passwd is now limited to root. DHCP Server C.mount -t usbfs /dev/usb001 /mnt/usb C . fdisk /dev/hd2 C. Answer: D Question: 456 Which of the following passwords would be the most secure? A.mount/dev/sda1 /mnt/usb B .mount/dev/hde1 /mntlusb Page 157 of 217 . D. NFS has now been disabled. DNS Server B. The kernel does not support loadable modules and must be recompiled.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. the technician enabled Shadow Passwords and MD5 Passwords.net Question: 454 The user installs the second SCSI hard drive into the computer and needs to partition it.

3DES C .conf has the following entry: mail. B . The server is now generating I/O errors when the kernel module for the network card is loaded.log Which of the following log events will this line cause to be logged to mail.RC2 B .The events logged from any host that begins with the name mail.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: A Question: 459 A technician added a PCI network card to a stable Linux server.Reconfigure the network card to use a different IP address.The events logged to the mail facility at any priority. D .NTLMv2 Answer: B Question: 461 If /etc/syslog. Answer: B Question: 460 Which of the following is supported when creating a Linux VPN (Virtual Private Network)? A . Which of the following is the BEST way to accomplish this? A .md5sum B .Move the network card to another available slot. C .chap D .Use ssh-keygen to generate public-private keys. Page 158 of 217 .Disable the power management in the BIOS.The events logged by a program called ail? C .Disable passwords on specific accounts that will use SSH.tar --checksum Answer: A Question: 463 A user wants to know how to set up SSH (Secure Shell) to communicate between systems without requiring passwords.checkfile D .cat-vet C .The events generated by a user called ail? B .log? A .* -iVar/log/mail. D .Change the server BIOS setting to disable the network card BIOS. Answer: C Question: 462 Which of the following commands can be used to check for file corruption? A . Which of the following actions will solve the problem? A . B .

/etc/services Answer: B Question: 466 Which of the following is a common tool used to determine what services and ports are running on a remote Linux box? A .netstat D .dhcpcd and rexec C .PCMCIA cards Answer: D Question: 465 Alter an upgrade of Apache. Which of the following files should be edited or replaced to correct the problem? A .iptables-F D .httpd.PCI cards B . Answer: A Question: 464 Which of the following configurations does cardmgr read at startup on a Linux system? A .iptables --delete Page 159 of 217 .conf C .remoted and dhcpd D .iptables-L B .named and httpd B .srm.xinetd.conf B .SCSI cards D .PXE (Preboot execution Environment) and tftpd Answer: D Question: 468 x iptables table? A .arp B .iptables-A C .ifconfig Answer: B Question: 467 Which of the following services needs to be installed on a server to support new diskless client workstations? A .USB cards C . D .nmap C .Use RSH (Remote Shell) rather than SSH because it does not require passwords.conf D .hosts file.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C . Web pages are no longer available and are replaced with a default page.Add systems that do not need passwords to the /etc/ssh.

Edit IiIo.80 C .SSH (Secure Shell) B . How much usable storage space is available? A .cpuinfo Answer: C Question: 470 The LILO boot configuration needs to be updated to support a new IDE hard drive that was installed. User12 is unable to create new files or subdirectories within this new directory. Which of the following commands can be used to see what processor was detected on boot? A .SSL C .dmesg D .Rlogin Answer: A Question: 473 A technician created a new directory for use by a user “User12”.120 Answer: C Question: 472 Which of the following allows for secure remote command line access? A . the technician observes the following: drwxr-xr-x 2 root root 4096 May 24 1 3:11 dirname Which of the following is the BEST way to enable User12 to use the directory without letting other users manipulate its content? Page 160 of 217 .proc B .Run “lilo -o /dev/hda” B .Telnet D .Set LILO=/dev/hda and then run “lilocont /dev/hda” Answer: B Question: 471 A Linux system is configured with a RAID 5 array consisting of six 20GB hard drives. How should this be accomplished? A . Using the is command.conf and run “lilo -v-v” C .Edit lilo.50 B .conf and run “liloconf -v –v” D .100 D .POST C .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: C Question: 469 A user complained that a laptop system seems slow.

.1.ssh/trusted_keys C .PPTP D .255.255.0 D .1.ATM B .0.ifconfig eth1 192.255.ssh/known_keys B .255.168.chown dirname User12 C .255.ssh/authorized_keys Answer: D Question: 475 Which of the following itconfig commands can be used to assign the P address 192.255.168.0 C .ATM B .PPPoE Answer: D Question: 477 Which of the following services commonly uses Port 22? A ..168.chgrp User12 dirname D .0.0 Answer: C Question: 476 Which of the following protocols is used while configuring a Linux workstation to use a connection via a DSL modem? A .ifconfig eth2 192.DNS C .15/24 to the second NIC (Network Interface Card) in a workstation? A .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A .1. and received a orbidden message. Where can the technician find detailed messages about this problem? Page 161 of 217 .ifconfig eth1 192.168.chown User12:User12 dirname Answer: D Question: 474 Which of the following files contains the key or keys required to login using SSH (Secure Shell) without a password? A .255.15 subnet 255.1 with a default install of Apache.15 subnet 255.15 netmask 255.ssh/allowed_keys D .0 B ..SSH (Secure Shell) D .SLIP C ..1.SMTP Answer: C Question: 478 A Linux technician accessed the Web server on http://1 27.168.255.15 netmask 255.1.chmod 700 dirname B .ifconfig eth2 192.

located in a secure off-site facility D .SHELL Answer: B Question: 481 A company’s mail server is unable to send mail to the domain comptia.find filename> background Answer: C Question: 483 Page 162 of 217 .In a binder.dig -t ms comptia org Answer: C Question: 482 Which of the following commands is used to search the whole directory structure to locate a specific file.httpd_log C . where should this documentation be stored. but not in the server room C .dig comptia.org C .find / filename & B .org D .find / -name filename & D .org.In a predetermined secure location on-site. to be tiled and labeled appropriately with the rest of the system documentation Answer: A Question: 480 Which of the following environment variables specifies the location where user files are stored by default? A .find / -name filename C . but still can execute other commands while the ‘find’ command is searching for the file? A . Which of the following commands might help determine if their DNS records are correct? A . according to best practice? A .error_log B .org B .FILES D .In an approved tire-proof container.HOME C .In an office.apache_log Answer: A Question: 479 After the Linux technician has completed the server configuration documentation.dig -t mx comptia.access_log D .PATH B .mailtest comptia.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A . securely stored in an area located near the server B .

Edit /etc/hosts.HP Alpha processor B . and read-only permission to the group.Edit /etc/printcap and add a filter to only include the database server C . IP forwarding is not working.htbin Page 163 of 217 .Limit file permissions on the printer filter to users on the database server D . No permission to others.5. Read and execute permissions to the owner.Run save proc B . and read-only permission to the group.Restart the network daemon C . Read and write permissions to the owner. No permission to others.Run echo “1” > /proc/sys/net/ipv4/ip_forward –save Answer: C Question: 485 A Linux print server must limit access to its printers.Limit file permissions on the spool directory to users on the database server Answer: A Question: 486 Which of the following processors would be fully supported by glibc-2.3-100.i86. and read-only permission to the group. and read-only permission to the group. No permission to others.Silicon Graphics MIPS processor Answer: C Question: 487 In which subdirectory of the Apache root should scripts be placed? A .conf file D .Intel Pentium lll processor D .lpd to only include the database server B .Edit the /etc/sysctl.rpm? A . Read and execute permissions to root. Only the database server must be allowed to print.bin B . C. B. D. No permission to others.IBM PowerPC processor C . Answer: D Question: 484 A network administrator has enabled lP forwarding on a Linux server with the following command: echo “1” > /proc/sys/net/ipv4/ip_forward After the server is restarted several weeks later. Read and write permissions to root. Which of the following commands should the network administrator have issued? A . Which method is considered best practice? A .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A file with permission set to octet 540 allows which of the following? A.

HFS (Hierarchical File System) D .tail -r /var/log/messages D . The cron job has run correctly for several months.FAT C .Checkthe user’s cron job for syntax errors and correct as needed./etc/host.log Answer: B Question: 489 Which of the following types of partitions can be used to provide a reliable shared partition on a dual-boot system with Linux and Windows 96? A .htdocs D .Ext2 B .tail -s /var/log/messages B .cgi-bin Answer: D Question: 488 Which of the following commands can be used to view the first 10 lines of the bootlog file? A ./etc/hosts B .allow Answer: D Question: 492 A user has a cron job that clears print queues at midnight each day.Check to make sure the printer is connected to the server and powered on.NTFS Answer: B Question: 490 Which of the following commands should be used to monitor system logs in real time? A .Check to make sure the user was properly logged into the network the night before. D ./etc/hosts.tail /var/log/boot.log C .first /var/log/boot.top /var/log/boot.conf C .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C .head /var/log/boot. Which of the following should be done FIRST to resolve the problem? A .Check the process list for an instance of crond running.tail -f /var/log/messages Answer: D Question: 491 Which of the following files should be edited to provide static name to lP address mapping? A .log B . Page 164 of 217 . B .cont D ./etc/resolv.log D . however the job apparently did not run the night before.tail -v /var/log/messages C . C .

It creates accountability by writing all “su” attempts to a su log. Which of the following commands will provide this information? A .hwstat | grepeth D .It prevents the system from being rebooted remotely.MD4 Answer: A Question: 495 After replacing the network card in a Linux machine.It stops bruteforcing attempts on the root account over the network.AES B . C .shell B . Answer: C Page 165 of 217 .chown 2755 filename D .It restricts sudoers who can su to root.SHA D .cat/proc/shell C .chmod 1755 filename C .chmod 6755 filename B . B .uname-s Answer: C Question: 497 Root logins should NOT be allowed over the network for which of the following reasons? A .echo $SHELL D . a user wants to find out if the card was detected properly at boot.dmesg | grepeth C . D .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: A Question: 493 Which of the following commands sets the permissions of a file to the following? -rwsr-sr-x A .ls-l/dev/eth* B .MD5 C .cat /proc/net | grep eth Answer: B Question: 496 Which of the following commands displays the name of the current shell? A .change 4755 filename Answer: A Question: 494 Which of the following is a reversible encryption standard? A .

Which of the following is the appropriate shell to set? A .conf file. How can this be done? A ./etc/pam.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 498 A set of computers is used for technical support.so in httpd./etc/group Answer: A Question: 499 An administrator needs to add support for PERL to Apache for the company’s Website.Run httpd --module perl_module from the command line./dev/hdb1 /mnt/hdb1 reiser defaults. notail 0 0 D . The administrator wants to do this by adding pen_module to the Apache configuration. Which of the following must be edited to accomplish this? A .noatime./dev/hd1 /mnt/hda1l ntfs defaults.Portable network traffic analyzer Answer: C Question: 502 A system administrator wants to disable shell access ror a user.Database server appliance D . notail 0 0 C . notail 0 0 B .Remove the #from #AddModule perl_module libexec/httpd/libssl./dev/hdb1 /mntlhdb1 ext3 defaults.conf file./bin/false C . C .noatime.notail 0 0 Answer: B Question: 501 Which of the following Linux systems would MOST likely be without a monitor and keyboard? A . D .bashrc D .Run http -Im perl _module from the command line. noatime./bin/passwd D . The manager has asked that users have restricted time periods in which they can login./etc/logon. Answer: D Question: 500 Which of the following is a valid entry for /etc/fstab? A.conf C . B .Remove the # from #LoadModule perl_module libexec/httpd/libssl./bin/sh B .Thin client workstation C .so in httpd.~/./bin/disable Page 166 of 217 . noatime.conf B .Web browser kiosk B ./dev/hda1 /proc/hda1 ntfs defaults.

Install via NFS (Network File Server) from a Web server. Which of the following is the BEST way to complete the installation? A .The fourth field Answer: B Question: 506 The UMASK value is set to 22.rwxr-xr-x D .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: B Question: 503 The system administrator notices the following file in a user’s home directory: -rwsr-xr-x 1 root userl 628684 Jun 1309:38 ksh Which of the following does this file indicate? A . Answer: B Question: 505 Examine the following /etc/passwd file: root:X:1423:0:99999:7::: dgringold:X:11423:0:99999:7::: jjones: !!:11432:0:99999:7:: 11688: tgold:!!:11342:11231:11678:7::: Which of the following is the password field? A .r-xr-wr-w B . Answer: A Question: 504 An administrator wants to install Linux onto a computer that does not have a CD-ROM drive.Copy the CD-ROM files to the machine using the 3.Install via TFTP (Trivial File Transfer Protocol) from the network.Only root has shared access for ksh.The third field D .rw-r--rAnswer: D Page 167 of 217 .txt when the file is created? A .----w--W C . D . Which of the following will the default permissions be on lilename.5” diskette drive.Install via FTP from an FTP server C . D .The second field C . B . C .ksh was inadvertently installed in user’s directory.The ksh service needs to be restarted.The system has been compromised. B .The firstfield B .

Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 507 The output of an “ls .startand and stop D .enable and disable Answer: D Question: 511 A server requires more swap space. which of the following commands is used to activate the new partition? A .profile Answer: B Question: 510 Which of the following commands can be used to start and stop printers and classes? A .profile C . After editing the configuration.Change the $PS1 variable in ~ /.SSH (Secure Shell) B .la” is the following: -rw-r-xrwx 5 root root 4096 Apr 20 10:03 file.cshrc D .cshrc B .Ipr B .Snort C .swapon-a B .Change the $PS1 variable in ~/.mkfs-swap C .txt How many hard links have been created to this file? A-0 B-4 C-5 D-6 Answer: B Question: 508 Which of the following is an IDS (Intrusion Detection System)? A .openssl D .Iprm C . A new swap partition is created at /dev/sdb2 using fdisk.sfdisk/dev/sdb2 D .ethereal Answer: B Question: 509 How can a user change their default BASH shell prompt? A .Change the $PPOMPT variable in ~/.Change the $PROMPT variable in ~/.mount-t vfs /dev/sdb2 Answer: A Page 168 of 217 .

/var/filesystems C .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 512 Which of the following is a secure authentication method? A ./tmp is used to simulate RAM.wall -s ‘Our Aliases’ > /etc/aliases B ./tmp requires a lot of space.Kerberos Answer: D Question: 513 How would a user send/etc/aliases as the text of an email to another user on the same system? A .Blowfish D ./proc/filesystems Answer: D Question: 515 Why should “/tmp” be located on a separate partition from the “/” file system? A .sendmail someone@localhost -s ‘Our Aliases’ > /etc/aliases Answer: B Question: 514 Which of the following files contains a list of file systems that can be currently mounted on the system if all supported modules have been loaded? A .postfix someone@localhost -s ‘Our Aliases’ </etc/aliases D .RC5 C . D ./etc/filesystems B . Answer: D Question: 516 Which runlevel would be used to repair a system and grant access to the root user only? A-0 B-1 C-2 D-6 Answer: B Question: 517 An administrator types the command s xl and the following is a portion of the output obtained: Page 169 of 217 ./tmp file system is cleared alter every reboot.mail someone@localhost -s ‘Our Aliases’ </etc/aliases C . C . B .MD5 B ./dev/filesystems D ./tmp could become full and fill up the root file system.

sysinit D ./etc/defaultrunlevel Answer: A Page 170 of 217 ./usr/group B ./etc/runlevels C .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Which process number should be killed to stop the map?and term?processes? A .rpm --update /mnt/cdrom/RPMS/*. Which of the following is the BEST command to use to update all of the existing RPMS on a server without making any other changes? A ./etc/inittab B .1921 Answer: C Question: 518 An update CD-ROM for a distribution contains the latest RPMs for all packages that they provide.15 B ./etc/rc./etc/group C . Which of the following files should the administrator edit in order to change the default system runlevel from 3 to 5 ? A .rpm -i /mnt/cdrom/RPMS/*.rpm Answer: A Question: 519 Which of the following Linux files is used to assign users to groups? A .rpm -F /mnt/cdrom/RPMS/*.820 C .rpm -update /mnt/cdrom/RPMS/*./etc/passwd Answer: B Question: 520 A Linux administrator just installed Xfree86.1707 D .rpm D ./etc/users D .rpm C .rpm B .

B . network services load properly.cat/proc/self/status B ..tar-Zxvf backup..gtarzcvf backup./etc/rc.Reinstall the wireless network card drivers on the system.cat /proc/sys/net/ipv4/ip_forward Answer: D Question: 524 A user who has a file open in vi wants to search for the next occurrence of the word ‘coexistence’. After boot.tgz * C . C .All hidden files C .tgz Answer: A Question: 523 A Linux server is configured as a router. Which of the following should the administrator run on the server to verify routing functionality? A .tar zcvf backup. D .Check the order of execution of services in the boot scripts.*’ A .tgz * D .Reconfigure the wireless access point to access Linux connections.s/coexistence D . Which of the following commands will accomplish this from within the editor’s command mode? A .d/squid status C .tar -cvf .Check that the PCMCIA ports are enabled in the BIOS.All files created in / D .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 521 A user has added a PCMCIA wireless network card to a Linux laptop.All directories B .-.f coexistence C .* | gunzip> backup . Which of the following could solve the problem? A .d/network status D .All files created today Page 171 of 217 .tgz * B .find_forward coexistence Answer: A Question: 525 The following command run as root will search the system for which of the following? find /-name ‘. if they are restarted by hand./etc/rc. but the administrator notices that packets are no longer being routed./coexistence B . Answer: C Question: 522 Which of the following commands can be used to back up all the files in the current directory and compress them? A . The network services tail on boot.

Run the sysprep utility from the Linux vendor’s CD.Decrease the APM (Advanced Power Management) value for the hard drive.README. Answer: C Question: 528 If the command below is executed in a user’s home directory. which of the following would be accomplished? echo hello>> allusers A . B . C . D . Answer: D Question: 527 When a Linux laptop runs on battery. D . Which of the following can improve the hard drive performance? A .Verify that the hard drive has been formatted.Increase the APM (Advanced Power Management) value for the hard drive. the hard drive performance significantly decreases.Review the HCL (Hardware Compatibility List) on the Linux distributor’s Website.Increase the amount of swap space on the disk.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: B Question: 526 Which of the following is the FIRST step that should be taken prior to installing Linux on new hardware? A .mount /dev/fd0/mnt/floppy mkfs-t msdos/dev/fd0 D .Decrease the amount of swap space on the disk.Auto.Makefile B .Sends the message ‘hello’ to all users on the system. Which of the following commands should be used to prepare the diskette for writing? A .Sends the message ‘hello’ to all currently logged in users.config D .Creates a new file called ‘hello’ and sends itto all users. C .mkdosfs /dev/fd0 mount -t msdos /dev/fd0 /mnt/floppy Page 172 of 217 .mkfs -text2 /dev/fd0 mount /dev/fd0 /mnt/floppy C . B .Download all appropriate device drivers from the Linux vendors Website. The diskette is unformatted.Appends ‘hello’ to the end of the file llusers? if it exists.Autorun C . C . Answer: D Question: 529 Which of the following files is commonly included with source code to automate the compilation? A .so Answer: A Question: 530 A technician needs to create a diskette to transfer data from a Linux server to a Windows 2000 server. B . D .mount /dev/fd0 /mnt/floppy mkdosfs /dev/fd0 B .

usermod -f D . C . Answer: B Question: 535 A user needs the ability to create new users on a system.rtelnetd Answer: C Question: 532 A user complains that the mount point the system uses for the CD-ROM device is too long. The user wants to change the mount point from /media/cdrom to /cdrom.Make the user a member of the operator group Page 173 of 217 . B .Edit the /etc/sysconfig/policies file C . NetBIOS. D .sshd C ./etc/mtab B .NSS (Network Security Services) lookup is enabled for NIS./etc/fstab C . and remote files.Add the user to the /etc/sudoers file B ./etc/mount D . and DNS lookups.rsh B .conf. Which of the following commands will remove the user from the system and maintain the contents of the employee’s home directory? A . Which of the following files needs to be edited? A .NIS requests are forwarded to DNS.userdel B . How can the user be given this privilege without the root password? A ./etc/exports Answer: B Question: 533 An employee has been terminated from the company.xinetd D .NIS is used first for hostname resolution./etc/hosts is used for all NIS.passwd -l C .userdel -r Answer: A Question: 534 In the file /etc/nsswitch.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: D Question: 531 Which of the following packages is used to implement Telnet services on major Linux distributions? A . DNS. what does the following line do? ~ hosts: nis files dns A .

Grant the user execute privileges to useradd./etc/init./documents C .nfs B .lp restart B .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D .cups restart C .NVRAM B .64 bit PCl slot B . Which of the following is the MOST likely place to find the documentation? A .d Answer: C Question: 540 Which of the following is the economical choice for high capacity off-site archiving? A .mtab C . and usermod Answer: A Question: 536 After a printer is removed from a Linux workstation. Which of the following must the system have to allow this to work at full functionality? A .Optical Recordable Page 174 of 217 .inet./usr/share/doc D ./etc/init.fstab D . which of the following commands can be used to restart the printing module? A ./etc/doc B .d/cups restart Answer: D Question: 537 A Linux technician is preparing to install a 64-bit Ultra 320 SCSI PCI controller on a x86 system.Tape D .64 bit processor D .64 bit diskette C . groupadd.SCSI C .d/ lp restart D ./usr/local/doc Answer: C Question: 539 Which of the following files is used to specify drives to be mounted on boot? A .64 bit memory path Answer: A Question: 538 The user would like to find documentation files of an installed package.

bz2 | bzip2 -d C .tar xf package.lsmod B .xmodmap D .bzip2 -d < package.bz2 Answer: C Question: 545 A user typed the following command on a machine: ifconfig eth0:1 192.keyboard Answer: C Question: 542 Which of the following is the BEST tool to measure system performance baseline over a period of time? A . C . Answer: D Question: 544 A user downloads the software package “package .tar xvf package.The sound card is not on the HCL (Hardware Compatibility List). D .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: C Question: 541 A Linux system has been installed using Chinese.1 assigned to eth0? Page 175 of 217 .tar.The sound module was not added to the kernel. The system administrator has been asked to change the language setting to English.netstat Answer: A Question: 543 After properly installing both the sound card and modules.tar. B .pmap D .The sound card does not support MP3 playback.sar B . the technician attempted to play an MP3 file.tar.tar | tar xvf package. Which of the following commands can be used to do this? A .depmod C .bz2 | tar xvf D .var C .The ALSA (Advanced Linux Sound Architecture) sound server was not started.5 up Which of the following is the effect of typing this on a machine that already has an address of 192. Which of the following command lines can be used to extract the contents of the package? A .bz2 B .160. but no sound was heard.155.160.tar.155.tar.bz2” from the vendor. Which of the following is MOST likely to be the problem? A .bzip2 package.

Users that may not log in using FTP Answer: D Question: 548 Which of the following packages helps to identify simple passwords? A .160.The current IP address will be replaced with 192.Crack Answer: D Question: 549 User jones’ cannot login to a Linux server.5 will be assigned to the second physical NIC Answer: C Question: 546 Which of the following tripwire commands can be run to analyze the current status of the system? A .tripwire --verify C .The account is using a service UID (User ID).155.Jones used the wrong password. B .The address of 192.5.5.Hosts that may connect through FTP C .Users that may log in using FTP B .155. The technician checked the server records and noted that shadow passwords are disabled. which otthe rollowing cables should be used? Page 176 of 217 . B .155.Hosts that may not connect through FTP D .160. D .192.tripwire --check B .160.tripwire --monitor Answer: A Question: 547 Which of the following describes the contents of the file etc/ftpusers? A .The account is disabled. C .Hunt B .5 will be assigned to eth0 as a second IP address. Answer: B Question: 550 When an ATA-133 hard drive is installed.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A . D .160.The account is expired.Hack C .tripwire --status D .155.The gateway address will be replaced with 192. C . The technician also noted that /etc/passwd contains the following entry: jones:*:1001:300:Bob Jones:/home/jones:/bin/bash Which of the following is MOST likely to be the problem? A .gnupg D .

80 pin 80 wire D .mkfs B .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A . Which of the following commands can be used to verify that the tape drive is operational? A . The owner is able to delete other files in the directory.uname B .rm -r /home/owner D .tcpdump ftape B .40 pin 80 wire B .mount -f ftape Page 177 of 217 .80 pin 40 wire C .1 owner owner5 Jun 13 12:14 A Which of the following should be checked next in order to diagnose this problem? A . but all attempts by the owner of /home/owner/A to delete the one file result in the output bash: A: Permission denied Given the file listing: -rw-r--r-.chfn C .68 pin 68 wire Answer: A Question: 551 Which of the following can be used to view username.lsattr /home/owner/A Answer: D Question: 553 Which of the following commands could be used to set the number of days a user can maintain the same password? A .cat/etc/shadow D .tar-xvf tape C . home directory. full name.dmesg C .cat /etc/services C . GID (Group ID).usermud D . and default shell information? A .cat/etc/group B . UID (User ID).cat/etc/passwd Answer: D Question: 552 The directory /home is on an ext2 file system.chpasswd Answer: C Question: 554 A new tape drive has been added to a Linux system.

partition map C . required services. user passwords B . root password.crit C . C .Partition map. daemon configuration.dhcpd C . partition map.APM (Advanced Power Management) B .System hardware.bind B .i2c-core Answer: B Question: 557 A system report indicates that /var is full. what part of the installation should be planned and documented? A .Truncate the log files. Which of the following daemons should the administrator verify is running? A . D . B .System hardware.Increase the allowable size of swap file. Which of the following modules must be installed to accomplish this? A . Which of the following is the MOST likely resolution to the problem? A . required services.Partition map. performance baseline Answer: B Question: 556 The company wants to have its laptops perform a clean shutdown of the Linux operating system when the power button is pressed.Ensure that users have not exceeded disk quota.err B .named Answer: D Question: 559 Which of the following syslog keywords has the highest priority? A .ACPI (Advanced Control and Power Intertace) C .resolvd D . Answer: A Question: 558 Users begin reporting that they receive ‘Unable to resolve hostname’ error messages.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D . required packages.Remove unnecessary applications that may be using too much disk space. required packages.dmseg | grep ftape Answer: D Question: 555 Before performing a new Linux server installation.power D .emerg Page 178 of 217 . performance baseline D . required packages.

Which of the following commands would accomplish this? A .twain Answer: B Question: 561 For troubleshooting.BIND B ./dev/sda D .iptables -A FORWARD -p udp --dport icmp -j DROP D . a technician needs to boot an SMP (Symmetric Multi-Processor) system to use a single CPU./dev/hda B .alert Answer: C Question: 560 Which of the following is necessary for a user to scan images from a flatbed scanner? A .iptables -A FORWARD -p icmp -j DROP C ./dev/sdb Answer: B Question: 564 A business wants to be able to track all Websites that are visited by its employees.Samba C . Which of the following is the correct parameter to pass to the kernel at boot time? A .gimp B .Apache Page 179 of 217 ./dev/hdb C .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D . Which or the following Linux packages would BEST serve this need? A .disable-smp C .nosmp B .sane C .iptables -A FORWARD -p icmp -j DENY B .iptables -A FORWARD -a all -proto ICMP -j REJECT Answer: B Question: 563 A user wants to install Linux as a dual-boot option on the second hard drive on the primary IDE controller. Which of the following devices would be the target of the Linux partitioning? A .block-cpu-1 D .enable_smp=no Answer: A Question: 562 The administrator wants to deny ICMP traffic from being forwarded.cops D .

FreeRADIUS D .SSH (Secure Shell) B .Kerberos Answer: A Question: 568 Using the BASH shell.MPEG-2 capable camera Answer: C Question: 567 A Linux administrator is trying to set up a server that provides the MOST secure communication for remote administration.MPEG-2 encoder D . which of the following commands will set number of entries in the command history to 1000? A .Sound card C .systeminfo Page 180 of 217 .set NEWSIZE=1000 B .export HISTSIZE=1000 Answer: D Question: 569 Which of the following commands will display a list of system hardware after the Linux system boots? A .POST C . which of the following multimedia components is also required? A . In addition to a video card with input source.proc B .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D .dmesg D .RSH (Remote Shell) C .Xfree86 B .Squid Answer: D Question: 565 In which of the following runlevels is X Windows started by default A-2 B-3 C-5 D-6 Answer: C Question: 566 A technician is creating MPEG-2 video files in Linux.alias HISTORY=1000 D .setenv HSIZE=1000 C . Which of the following is the BEST choice for this situation? A .

The permissions on the printer’s spool directory are set to allow access to all users.Use an IP alias. Users can print to other printers on the server. The script should check if the RPM is already installed.Virus C .Use a static IP address. Answer: B Question: 571 A production Web server is experiencing an unusually large amount of new incoming TCP connections. Which of the following is MOST likely the problem? A .NIC malfunction Answer: A Question: 572 The IDS (Intrusion Detection System) reports many events that are not security incidents. Which of the following is MOST likely the problem? A . Answer: B Question: 574 An administrator wants to create a script that installs NewFonts.Configure the DHCP Client.rpm on several desktop computers.The /etc/printcap file is missing.False negatives Answer: C Question: 573 A Linux server is to be used as a Web server.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: C Question: 570 Users are unable to print to a remote printer on a Linux server.Root does not have read permission on the print filter.DoS (Denial of Service) B . Which of the following commands would determine if NewFonts.rpm is already installed? A . The technician determines that all of the users and machines have the right to print to the server. D . Which of the following is the BEST way to configure its Ethernet adapter? A . D .The SUID bit on this printer’s spool directory is not set.Too manyusers D .rpm-a NewFonts Page 181 of 217 . B . Which of the following is the term for these types of events? A .Configure the DHCP Server.False positives D .True positives B . C . B .True negatives C .Users do not have execute permission on the print filter. C .

fuser C . D .VirtualWebsite D . B .Full access to root only D .ipuser Answer: A Question: 578 Which of the following are the default permissions for a symbolic link file? A . Which of the following needs to be done in order to resolve this issue? A .VirtualHost C . Which of the following commands would display contact information for this domain? A .com domain and would like to contact the example. Which of the following log files reveals this information? Page 182 of 217 .Load a kernel module for the drive.HeaderSite B .Change the default run level in /etc/inittab.whois B .Editthe/dev entry for the device. C . Answer: A Question: 576 A user wants to derine a new Web space. Which of the following directives can be used to accomplish this? A .Full access to the owner only Answer: B Question: 579 An administrator needs to check which users are utilizing the u command and when it is being utilized.whoip D .rpm --list NewFonts D .com administrator.rpm-q NewFonts C .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B .Edit the /etc/fstab file. rather than by examining the port number of IP address.NamedSiteEntry Answer: B Question: 577 The administrator notices malicious network traffic from the example.rpm --checksig NewFonts Answer: B Question: 575 A recent hard drive addition to a server has a problem: the administrator has to manually mount the drive every time the server is rebooted.Full access to everyone C .Same as the target file B . The browser header will be examined by Apache to determine which Web space the client will be sent.

man-k B .log D .sysinfo /dev/hda B .ssh -| jdoe4 example .boot.wtmp B .com jdoe4:password Answer: B Question: 583 A hard drive is taking a long time to complete file copies.makewhatis D ./var/log/messages Answer: D Question: 580 Which of the following commands is used to rebuild the man page database used by the hatis command? A .ssh example.dmesg C ./etc/sudoers C .grep dma /proc/ide/hda/settings Answer: D Question: 584 Which of the following encryption algorithms are natively supported for the /etc/shadow file? Page 183 of 217 .ssh jdoe4 example.grep dma /proc/hdinfo D . The user suspects that the IDE drive may not be using DMA.man --rebuilddb Answer: C Question: 581 A daemon unexpectedly terminates.messages Answer: D Question: 582 Using SSH (Secure Shell).com D .com C . Which of the following commands can be used to verify the hard drive connected on /dev/hda has DMA enabled? A ./var/log/lastlog D .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A ./etc/wtmp B . what is the correct syntax for the user doe4?to login remotely to the examplecom server? A .fdisk-l /dev/hda C . Which of the following files can be viewed to determine the source of the problem? A .whatis-r C .ssh --userjdoe4example.com B .

org Website B .ext3 D .jfs B .The hardware manufacturer’s Website Answer: B Question: 587 Which of the following file system types should be used for the /boot partition.twofish Answer: B Question: 585 Which of the following commands can be used to verify if a specific cron job is scheduled? A .The SourceForge Website D .at -m B .mkswapfsiso Answer: B Question: 589 Which of the following commands is used to obtain the summary of mounted hard drive partitions? Page 184 of 217 .swapon B .crontab -l D .3DES D .crond -q C .cat /proc/timer/crond Answer: C Question: 586 A technician is installing hardware in a Linux system that is not supported by the current kernel.The gnu. Where should the user obtain a newer kernel? A .DES C .ext2 C .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A .mkswapfs D . assuming it should be accessible from a minimal boot kernel? A .org Website C .RC4 B . The Linux distribution does not provide any updates.The kernel.reiserfs Answer: B Question: 588 Which of the following commands creates a swap file system? A .mkswap C .

C .Remove the www userfrom the local passwd file. Answer: B Question: 592 A user is trying to print a .fdisk-l Answer: A Question: 590 DMA (Direct Memory Access) is required for which of the following items? A . Answer: D Question: 593 A Linux technician needs to check the current resource utilization for processes.pmap D .The printer will print pages with strange characters.Serial port D .ls-la D . B . D .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A .Mouse B .sar C . D .Keyboard C . Which of the following commands should be used? A . B . C .fsck C .The flyer.pdf Which of the following results will MOST likely occur? A .Change the home directory for the www user in the local passwd file.Sound card Answer: D Question: 591 On an NIS client.top B .An error message will appear. The correct location for the NlS ‘www’ user is /mnt/www.The flyer.netstat Page 185 of 217 .pdf file will print correctly.pdf file will be displayed.Remove the www user from the NIS passwd map.pdf document using the following command: lpr flyer.Change the home directory for the www user in the NIS passwd map. ‘cd ~www’ changes to /var/www.df B . 'ypcat passwd | grep www' reports: www:X:73:NIS www user:/mnt/www:/bin/sh Which of the following is the BEST solution to the problem? A .

ifconfig eth0 down Answer: D Question: 596 A network problem occurs somewhere between a Linux PC and a remote Website.netview C .xcopy D .cpd C .fsck C .ifconfig eth0 disable D .demesg Answer: D Question: 595 An administrator wants to temporarily disable the eth0 network interface on a server.dd B .sshd_config D ./etcMnetd.pam_deny.conf Answer: C Question: 598 A user wants to create an image of a system boot disk in order to copy it. Which of the following commands will help locate the point of failure? A ./etc/passwd B .netstat B . It went by too quickly on the screen for the administrator to read the details.top B .debug D . Which of the following commands will accomplish this? A .cp--disk Page 186 of 217 . The SSH daemon is confirmed to be running. Which of the following configuration riles may need to be edited to permit logins? A .pathping D .so C .ifconfigeth0 off C . How can this information be recalled? A . Which of the following commands will do this? A .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: A Question: 594 An administrator watches a Linux system boot and noticed an error with one of the hda partitions.traceroute Answer: D Question: 597 No users can connect via SSH (Secure Shell).ifconfig disable B .

4.0)./eft/environment D . B . not (hda1).d/su B .conf Answer: A Question: 601 A user created the following grub.route B .The correct path should be /boot/vmlinuz-2.The splashimage should not be gzipped.The command would use SSL (Secure Socket Layer) by default.22.The command restricts permissions to the superuser.4. D .22 ro root=LABEL=/ hdc=ide-scsi rhgb initrd initrd-2./etc/sysctl. Which of the following commands can be used to change the current MTU value to a new one? A ./etc/login. D . B .conf C .conf file.22 Which of the following is wrong with this file? A . Answer: C Question: 600 Which of the following configuration files should a Linux administrator edit in order to restrict the use of su to a single group? A . Answer: D Question: 602 An administrator needs to adjust the MTU (Maximum Transmission Unit) value on an Ethernet interface. C .gz title Linux Server (2.The command will have the sticky bit set.The hard drive label should be (hd0.xpm.netstat Page 187 of 217 .The root partition should be mounted “rw”.The command runs with permissions of the superuser./etc/pam. C .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: A Question: 599 The /usr/bin/passwd command has the following permissions: -r-s--x--x 1 root root passwd Which of the following will occur? A .22) root(hda1) kernel /vmlinuz-2. default=0 timeout=10 splashimage=(had l)/grub/splash. not “ro”.4.4.

The root file system will be corrupted./usr/src B . Page 188 of 217 ./usr/kernel C .crypt B .1 user 1 staff 0 8 May 11:45 test. B . Where are the kernel sources normally located? A . but neglected to update /etct/stab.txt B .txt A ./opt/kernel D .txt to have the following access privileges? -rwxr----. C .It maps a MAC address to a hostname. how would a user modify the file test.iptables D . When it is compiled it asks for the location of the kernel sources.It maps a MAC address to an P address.txt D .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C . Answer: C Question: 605 Which of the following tools can be used to identify poor password usage from the user by auditing password usage? A .chmod 013 test.crack Answer: D Question: 606 A Linux administrator converted the root file system from ext2 to ext3.ifconfig Answer: D Question: 603 A new driver version has been downloaded. B .The kernel will halt mounting the root file system.It maps a hostname to a MAC address.chmod 047 test .chmod 740 test. D .crackpasswd D .chmod 310 test txt C . Which of the following will happen the next time the system boots? A .passwd C ./usr/kernel/src Answer: A Using octal permissions.txt Answer: A Question: 604 Which of the following is the tunction of the ARP (Address Resolution Protocol)? A .It maps an IP address to a MAC address.

except journaling will be disabled.chown 755 <filename> C . which of the following is the next step in installing the application? A .16a.run rpm B .move the extracted directory to /usr/local/application Answer: C Question: 609 Which of the following services commonly uses Port 25? A .168. How can the detailed file information in the file be viewed without extracting the contents? A .The system will boot as normal.50 Answer: B Question: 611 A Linux user has a file named backup.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C ..0.tar lf backup.rarp 192.chmod u+x <filename> Answer: D Question: 608 An administrator needs to add a new application to an existing Linux machine.0. The application is available in source code and distributed in a file called “application.tar.hostname-r 192.50 C . Answer: D Question: 607 Which of the following commands enables a user to make a newly-created shell script executable by only its owner? A .0.riockup 192. make. D .168.tar.SMNP Answer: C Question: 610 Which of the following commands can be used to provide a reverse lookup of an IP address? A ./<filename> B .run configure.gz”.POP3 C .The file system will be automatically detected as ext3.tar tf backup.tar B .dig-x 192.SMTP D .50 D ./configure <filename> D . make install D .0.tar lvf backup tar Page 189 of 217 .run apt-get C .168.tar C .50 B . After extracting the file.FTP B .

87/26.ifconfig eth0 up 192.rpm -c samba.255.168. How can this be made secure? A .1.255. C . B . but the mount command generates the following error: mount special device /dev/sda1 is not a valid block device Which of the following is the MOST likely cause of this error? A .168.168. The default gateway’s P address is 192./dev/sda does not exist.1.87 netmask 255.The USB memory stick is not formatted.rpm -v samba.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D . Answer: A Question: 614 A USB memory stick is plugged into a server. What command must be entered on the client machine to enable communications to the Internet? A .rpm -V samba.1.255.255.1.ifconfig eth0 up 192.rpm B .Configure local X sever to allow the remote host.1.168.rpm C .1.0 Answer: A Question: 613 A Linux user wants to access the X interface on a remote server.168.255. Answer: C Question: 615 Which of the following commands can be used to confirm checksums on the Samba package? A .Install an X server on the local client.Use SSH (Secure Shell) to forward X11.168.128 B .1.87 netmask 255. C .0 device was plugged into a USS 1.tar tvf backup.255. The clients TCP/IP settings are 192.1 netmask 255.tar Answer: D Question: 612 A user is unable to access the Internet from their Client.168.A USB 2. B .255 D .rpm D . D .255 C .87 netmask 255.rpm -i samba.192 broadcast 192.Install a secure version of X.255.1.rpm Answer: A Question: 616 Which of the following is used to register a new printer with CUPS on a system using default settings? Page 190 of 217 .0 socket.The kernel module loader is not available.ifconfig eth0 up 192. D .ifconfig eth0 up 192.255.

To reset a forgotten user password C .chmod 777 file Answer: A Question: 618 Under which of the following sce/varios should an administrator initiate single user mode? A .To run fsck on a damaged filesystem D .chmod 770 file C .0. Which of the following files should be edited to ensure the server will return answers for this zone? A .dns.cupsct B .lynx http://127./usr/config C .chmod 077 file D .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A .conf D ./usr/default.LDAP C . Which of the following is a “Id protocol for centralized user authentication? A .conf Answer: A Question: 621 An administrator wants to add a new forward DNS Zone file to the Linux DNS server./etc/skel B .cups --add-printer C .0.To check the root and postmaster mail boxes Answer: C Question: 619 A compary currently has tour Linux servers and wants to Install a fifth server to perform user authentication.named.MD4 B .To suspend a user account B .chmod 700 file B .conf B .SHA1 D .edit /etc/cups/printcap Answer: C Question: 617 Which of the following commands will secure a script file so it could be modified only by the owner? A .conf Page 191 of 217 ./etc/users.1:631 D .3DES Answer: B Question: 620 Which of the following contains user default configuration files and directories? A .

the name ogger is which of the following? A . Answer: B Question: 624 Which of the following commands is used to show all of the root processes running on a system? A .nameserver. The user johnd is removed from the system and all of his data is moved to the /var/archive directory.ps -au root D .psroot B .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C . deleting all of the data in his home directory B.A program name D .old Answer: B Question: 623 Which of the following will happen when the following command is run? userdeI johnd A.cat /proc/sys/proc Answer: C Question: 625 The /etc/exports file on a Linux system contains the following entry: /var logger(ro.A hostname C .conf D . The user johnd is removed from the system.In -s /home/joe/help /tmp/help.A directory or filename Answer: B Question: 626 Page 192 of 217 .old C . The user johnd is removed from the system while keeping all of the data in his home directory.In -v /home/joe/help /tmp/help. The user johnd is removed from the system and all data in the home directory is moved to the /home/deletedusers directory. C.In -s /tmp/help.conf Answer: B Question: 622 Which of the following commands can be used to create a link to the file /home/joe/help in /tmp/help.old /home/joe/help D .A username B .resolv.jobs 0 C .no_root_squash) In this file. D.In -s help help old B .old? A .

inittab id:5:initdefault: B .route add IP_FORWARD eth0 B .It enables application shortcut keys.eth0. Which of the following commands will enable routing? A . Answer: C Question: 630 Page 193 of 217 .forwarding = 1 C .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 When the command ‘gcc’ is run in a newly created directory. which file needs to be edited and what is the correct parameter? A . C .ipv4.forwarding = 1 Answer: C Question: 629 What does enabling the “dead keys” option during installation do? A .ipv4. Alter further troubleshooting. The system should boot into multi-user mode with a non-graphical interlace.sysinit.$PATH B .It disables unused keys based on the language option selected. D .conf initdefault 5 Answer: B Question: 628 A Linux server has been configured as a gateway to allow local LAN access to the Internet.echo “1” > /proc/sys/netfipv4/ip_forward D .sysctl -a net.$DISPLAY D .It provides the ability to create special characters. In order to correct this.sysctl -n net. B . it has been determined that IP forwarding is not enabled on the Linux server. the system returns the error command notfound Alter confirming gcc is installed on the system.$EXECUTABLES Answer: A Question: 627 A Linux machine always reboots shortly after the boot loader completes. which environmental variable must be modified to correct this problem? A .It disables the function keys.conf initdefault 3 D .conf.inittab id:3:initdefault: C .$PROMPT C .sysinit.conf. Users can ping the gateway address but cannot access the Internet.

wend C .ls -l jupiter C .su --single D .Check the Linux distribution’s Website.init 1 B .chroot -so C .showmount e jupiter D .Check the /etc/sysconfig directory.ls jupiter B . B . D .done D .mail B .Check the /dev directory. C .mailq D .end B . Answer: D Question: 631 Which or the following commands lists the rile systems available for the NFS (Network File System) server upiter? A .elihw Answer: C Question: 635 Page 194 of 217 .showmount -e jupiter Answer: D Question: 632 Which of the following commands could an administrator use to switch to single-user mode without rebooting the system? A .sudo --single Answer: A Question: 633 Which of the following commands allows a user to view undelivered messages on a server using sendmail as the MTA (Mail Transport Agent)? A . The model number is available to identify the card. How can the Linux technician confirm that the device is supported by the Linux distribution? A .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A telecommunications controller will be installed in a Linux server.smtpd C .sendmail -bd Answer: C Question: 634 Which of the following is used to terminate a hue loop in a BASH shell? A .Check the government’s telecommunications Website.

cat /proc/ide/raid C .Mozilla Answer: C Page 195 of 217 .Bind B .chown-f B .Use obs to list CPU-intensive processes in order. Answer: A Question: 639 Which of the following packages would be selected during installation to provide a Web server? A .Use op to list processes ranked by CPU utilization.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A user named ‘john’ needs to have read.Apache D .chown -u +wx Answer: C Question: 636 How could a user substitute all instances of C with omputer in a file named instructions and display the results in the terminal window? A .cat instructions | awk ‘/PC/ print computer’ Answer: A Question: 637 Which of the following commands is used to check the status of a sottware RAID? A . John currently has read-only permission.Use is tree to list processes with the highest foreground priority. C .Squid C .mkraid --status D . Which of the following commands can be used to add write and execute permissions for him without changing anyone else’s permissions? A .mkraid --verify Answer: A Question: 638 A system is running slowly and the administrator wants to find the process that is using the MOST resources.cat /proc/mdstat B . and execute permissions to the following file: /home/joh n/resume. write. B . Which of the following will accomplish this? A .Use ice -I -n 1 to list the process with highest CPU utilization. D .sed -s PC -r computer instructions C .chmod 700 C .chmod u+wx D .cat instructions | awk Computer D .sed s/PC/computer/g instructions B .

err -/var/log/auth -Ipr Answer: A Question: 643 If the IP address of a host on the network is known. and DNS settings for other devices on a network? A .auth.routed C . Which of the following entries in /etc/syslog.conf would BEST accomplish this? A .Blowfish B .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 640 Which of the following is used to secure http communications? A .auth.dhcpd B .auth.SSH (Secure Shell) C .netsetup D .auth.dig C .traceroute Answer: A Question: 644 A Linux technician is installing a new SCSI tape drive. which of the following commands can be used to find the MAC address of that host? A .err -print C .11 D .err | lpr B . Which of the following is the default ID on a SCSI controller card? A-1 B-7 C .PGP (Pretty Good Privacy) D . routing.16 Answer: B Page 196 of 217 .nslookup D .netconfig Answer: A Question: 642 Company security policy requires that all authentication errors be logged to a printed hard copy.err +/dev/lp0 D .arp B .TLS (Transport Layer Security) Answer: D Question: 641 Which of the following services could be used to provide remote configuration of the networking address.

smbcheck C . the user decides to test the DVD drive to ensure it was installed properly.SCSI device C .Issue the command “mount /dev/dvdrom /mnt/dvdrom”.testparm B . C .chkconfig samba Answer: A Question: 648 The administrator sees this line in /etctrstab: /dev/md0 / ext3 defaults 0 1 Which of the following BEST describes the /dev/mdO device? A .pwck C . D .Insert a DVD into the drive.RAID device Answer: D Question: 649 Which of the following can be used to determine if the entries in /etc/shadow are corrupt? A . Which of the following actions will MOST likely solve this problem? A . Answer: D Question: 646 When a USB memory stick is used on a Linux server.grpck D ./dev/sda B .ATA device B .passwd Page 197 of 217 .smbd --check D . which of the following device files would likely be used to access it? A .pwd B .LOOP device D . the error “mount: no medium found” is returned./dev/ram0 C . After issuing mount /mnt/dvdrom. B . Which of the following commands should be run to verify that the configuration is correct? A . then re-issue the mount command.Create the directory /mnt/dvdrom.Ensure that /mnt/dvdrom has an entry in /etc/fstab.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 645 After setup has completed./dev/usb/auer0 Answer: A Question: 647 A Samba server is not functioning properly./dev/usb/hd1 D .

There is an entry in /etc/ftpusers for repository user.0/25 to 192.255.route 192.255.100.5 B .routeadd-net 192.168.100. D .160.200.200.255.Restart the SSH service B .192g w 192. SSH is now no longer accepting connections.There is no entry in /etc/exports for repository user’s home directory.100.Near the system administrator’s workstation Answer: A Question: 654 A workstation user is unable to mount a CD-ROM drive.126 gw 192. Which of the following would resolve this problem? A .255.200. remove the Port 22 rule Answer: D Question: 652 Which of the following commands would ensure thatthe Linux serverwould send packets destined for 192.route 192.168.0 netmask 255.168.168.From the system console.128 gw 192.5 D .routeadd-net 192. Answer: B Question: 651 When remotely administering a Linux machine using SSH (Secure Shell).168.SSH to Port 23 and remove the rule C .The repositoryuser is not in the FTP group. Which of the following is MOST likely the problem? A .5 Answer: C Question: 653 When a new Snort system is installed.0 netmask 255.Remove the rule before it is activated D . C .168.0 netmask 255.0 netmask 255.5 A .168.255. B . The following entry in /etc/passwd corresponds to this user: repositoryuser:x:502:502::/home/repositoryuser:/bin/fales Upon testing.200.200.168. Which of the following commands can be used to confirm the operating system recognizes the drive ? Page 198 of 217 .On an isolated network segment D .On the core network router C . where should the system be placed on the network? A .100. the administrator added a rule to deny traffic on Port 22.On the network perimeter B .100.5 C .255. repositoryuser cannot login to the FTP server.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: B Question: 650 A new user must have local FTP access but not interactive login access.192 gw 192.There is an entry in /etc/shells for repository user’s shell.255.255.168.

Boot to single user mode.The ipchains package needs to be upgraded C .find cdrom B .Make B . Answer: B Question: 658 Which of the following is the default file name for the ake command? A . After upgrading to a 2.init B .Reinstall the operating system.The old ipchains module needs to be loaded D .Compile as root and install as a normal user.4 kernel.Makefile D . The prior administrator did not give the root password to the current administrator.The new kernel was not compiled with ipchains support Answer: D Question: 656 A new administrator is asked to reconfigure a Linux machine. B .in C . C .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A . B .Config. C .Compile as a normal user and install as root.dmesg | grepCD C .cat fstab | grep CD D .klogd Page 199 of 217 .Use view to edit the password file. Which of the following is the FIRST step the new administrator should do to reset the root password? A . D .cat mtab | grep cdrom Answer: B Question: 655 A system administrator inherits a Linux system with a 2.Run a password recovery utility. Answer: A Question: 657 Which of the following is the BEST security practice for compiling the package from the source? A .The 2.make Answer: C Question: 659 Which of the following processes has the lowest PID (Process ID)? A .4 kernel does not support ipchains B .Compile and install the package as root.2 kernel. D .Config.Compile and install the package as a normal user. Which of the following is the likely cause? A . the ipchains commands no longer function.

The user1 directory has 578 modes.1 onto the local mount point called /usr. D.The userl entry was deleted from /etc/passwd.ftp C . Which of the following commands would remedy this situation? Page 200 of 217 .snmp D . mount mountd remount smbmount Answer: A Question: 663 Which of the following protocols is used by NIS? A . C .rpc B . B . C.The userl directory is now owned by user 578. D .dhcp Answer: A Question: 664 The /var/log/messages file was deleted and the syslog daemon did not recreate it. Which of the following commands should be used? A. B.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C . Answer: D Question: 661 Which of the following virtual console sessions does XFree86 use by default? A-1 B-3 C-5 D-7 Answer: D Question: 662 An administrator wishes to mount an NFS (Network File System) export of the directory /usr located on 100.kswapd D .syslogd Answer: A Question: 660 The administrator issues the ‘ls -l/home’ command and sees the following output drwxr-sr-x 2578 578 4096 Jun 13 13:50 userl The output indicates which of the following? A .User1 is a.0.

bash_exit B .nessus C .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A .logoff_now C .~/.cat /dev/random > /var/log/messages Answer: A Question: 665 The administrator discovers that the SSH (Secure Shell) key may have been compromised.~/.man -k 5 passwd Page 201 of 217 .man 5 passwd C .man-k 2 passwd D . Which of the following commands will do this? A .man 2 passwd B .:! ps -aux C .logform /var/log/messages D .nslookup Answer: B Question: 668 Which of the following commands will display information in the manual page for the passwd file? A .:cmd ps -aux Answer: B Question: 667 When a login shell exits.bash_logout D .touch /var/log/messages B .logoff_shell Answer: C Which of the following is a popular open source tool that is used for vulnerability assessment? A .ssh-keygen C .slocate D .:#ps -aux B .dig B .make ssh-key D . Which of the following commands would the administrator run to create a new key? A .syslogd --recreate-file C .~/.make clean | ssh-key Answer: B Question: 666 A user is editing a file in vi and wants to run the command s ux without leaving vi. BASH reads and executes commands from which of the following files? A .keygen-ssh B .~/.:// ps -aux D .

Which of the following is MOST likely the problem? A .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Answer: B Question: 669 Which of the following is a valid command to format a partition as Reiser FS? A .The network card is disabled.chmod 761 file Answer: D Question: 673 A Linux disk indicates that it has errors./var D . The workstation is connected to an unmanaged switch.reiserfs /dev/hda6 D .fdisk-V Page 202 of 217 .chmod 726 file D . B .The network card is in promiscuous mode./dev B . D .The network card duplex setting is incorrect./usr C .mkfs/dev/hda6 B .chmod 471 file B . and the result is: -rwxrw---x 5 root wheel 8192 Jan01 21:00 file Which of the following chmod commands corresponds to the current permissions of the file? A .mkIs -reiserts /dev/hda6 Answer: C Question: 670 The user of a Linux workstation reports slow network performance during heavy Web access.chmod 623 file C .mkIs. Which of the following commands tests an entire ext2 file system and repairs errors without user interaction? A .reiserfs/dev/hda6 C ./proc Answer: D Question: 672 The command is -l file is issued.The network card is bad. C . Answer: D Question: 671 Where is the ACPI (Advanced Control and Power Interface) power management dynamic information stored when devis is compiled into the kernel? A .

Samba D .printq -A D .find fmnt -suid -type f -ls D .find /mnt -mode s -ls B .Afiag oroption code D .A list of runlevels Answer: D Question: 677 Which of the rollowing packages is needed on a server to allow other Linux workstations to authenticate local users through the server? A .lmapd C .find /mnt -setuid -ls C .e2fsck-a C .lpq -A C .printq -a Answer: A Question: 675 Which of the following commands can be used to display the location of all the setuid regular files on /mnt? A .A terminal id B .Atimeoutvaiue C .NIS B .find /mnt -type f -perm -u+s -ls Answer: D Question: 676 The following line is found in /etc/inittab ~ 3:2345:respawn:/sbin/mingetty tty3 ~ What is the meaning of the second field in this conflguratlon line? A .e2fsck-V D .lpq-a B .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B .NFS (Network File System) Answer: A Question: 678 Page 203 of 217 .e2fsck -y Answer: D Question: 674 Which of the following commands will allow a Linux administrator to view waiting print jobs for all printers? A .

Which of the following sources will BEST confirm that the hardware is supported by the version of Linux being installed? A .linuxdoc.Internet search engine B .www.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A RAID controller is to be installed in Linux as the boot device.RAID manufacturer’s Website Answer: C Question: 679 Which of the following commands will create the directory /home/gawd/tools/security regardless of the existence of its parent directories? Page 204 of 217 .Linux distribution Website D .org C .

XF86Config D . Which of the following configuration files should be edited to support the specific country keyboard? A .md -m /home/gawd/tools/security B .Add ermitRootLogin no to /etc/ssh/sshd_config Answer: D Question: 683 The system administrator wishes to view vmstat output once every 10 seconds for the next minute.keyb.ssh/sshd_config C .mkdir --makepath /home/gawd/tools/security Answer: C Question: 680 Which of the following IRQs is commonly used by /dev/hda? A-3 B-7 C . a user with a Swedish keyboard has the English character set loaded.15 Answer: C Question: 681 After a company-standard installation.Add enypootLogin to /etc/.vmstat-10-1min C .mkdir -m /home/gawd/tools/security C . Which of the following commands accomplishes this? A .vmstat--time=’1 min’ 10 Answer: A Question: 684 Which of the following commands can be used to ensure that all the files in /home/user and its subdirectories are accessible only by the owner of /home/user? Page 205 of 217 . steep 60 D .ssh/sshd_config B .bash_profiles Answer: C Question: 682 How should a Linux administrator prevent the root user from logging in remotely via SSH (Secure Shell)? A .Add ermitLogin no to /root/.Xmodmap B .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A .ssh/sshd_config D .vmstat 10.conf C ..vmstat 10 6 B .14 D .Add enyLogin to /root/.mkdir -p fhome/gawd/tools/security D .

RAID 1 C .255.0 C .RAID 0 B .chmod 711 /home/user B .255.255.print -check B .chmod 744 filename B .0 up B .chmod u=rw filename Answer: A Question: 687 An administrator would like to test a newly installed printer.echo testing | lpr D .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A .lpr-P/dev/zero C .lpr -test </dev/zero Answer: C Question: 688 Ping requests to a network gateway fail.0 D .255.ifconfig eth0 netmask 255.if eth0 subnet 255.chown user /home/usert/* D . Which of the following commands would accomplish this A .255. It is determined that an interface’s subnet mask is incorrect.0 Answer: B Question: 689 Which of the following services is commonly started from xinetd? Page 206 of 217 .chown -R user /home/user Answer: B Question: 685 Which of the following RAID configurations is BEST for a streaming-video server where reliability is NOT important? A .chmod 755 filename C .chmod 700 /home/user C .ifup eth0 subnet_mask=255.255.ethtool eth0 subnet_mask=255. Which of the following commands will correct this issue? A .255.chmod o+x filename D .255.RAID 3 D .RAID 5 Answer: A Question: 686 Which command would set a file’s permissions to the following? rwxr--r-A .

log be found effectively? A .crontab -l C .crontab -e Answer: B Question: 691 In a Linux software RAID 1 array created during the installation process. Now the system will not boot.find / -n error.fingerd Answer: D Question: 690 Which of the following commands can be used to view a user’s crontab entry? A . C .ldconfig B .find / -name error.find / -daystart -amin 60 -name error.smbd B .Run fsck on the faulty drive.so.find -name error.log C . the primary IDE master has a hardware failure.log D .Use fdisk to repair the partition table. Which of the following programs should be run? A . Which of the following will allow the system to boot properly and salvage the information? A .cronview B .kill -HUP1 Answer: A Question: 694 Page 207 of 217 . D .httpd C .Use Disk Druid to repair the array. B . Answer: D Question: 692 An application is tailing and indicates that the error. How can this tile for the error. the technician needs to reload /etc/ld.Id --reload D .log should be viewed.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A .ldupdate C .Remove the faulty drive from the system.log B .crontab -v D .conf and refresh the dynamic linker’s cache so new programs that need the new library can run. but no location is provided.log Answer: C Question: 693 Alter installing or updating a dynamically linked library.sendmail D .

log and update it every 15 seconds.swap D . D .sar -f -s 15 -n 3 messages.The server needs to allow NFS UDP packets.smbserver C .follow -f -s 15-n 3 messages. C .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Which of the following settings of the UMASK would cause new files to be created with mode 640? A .177 C .The server is not allowing the client to connect.watch -f -s 15-n 3 messages. B .log D .log Answer: B Question: 698 A Linux specialist wants to check which shares are offered by a Windows server.037 B . Which of the following commands is used to perform this task? A .367 D .tail -f -s 15 -n 3 messageslog C .smbclient B .ext3 C .showshares Answer: A Question: 699 Page 208 of 217 .listshares D . Answer: C Question: 697 If a user wishes to monitor the last three lines of the log file messages.log B . Which of the following is the MOST likely cause of this error? A .The directory needs to be remounted as NFSv3.reiserts Answer: C Question: 696 The root user receives a ‘Permission denied’ error message when trying to write files to an NFS (Network File System) mounted directory.The server share needs to specify no_root_squash.640 Answer: A Question: 695 Which of the following tile systems are compatible with a partition that is typed as 82? A .vfat B . which of the following commands should be issued? A .

tar.Place the command in the /etc/rc.rpm --erase exim D .The Apache Web server is running.The SSH (Secure Shell) is disabled. B .Copy the command to the /boot directory.bz2 Page 209 of 217 .Database server D .Streaming media server Answer: B Question: 701 A Linux server may have vulnerabilities if which of the following occurs? A . Which of the following commands could be used to uninstall the software? A .rm -r exim B . D .local file.The system is unpatched. D .bz2 B . C . C . B .rpm.uninstall exim C .Firewall B . Answer: C Question: 703 A technician needs to extract the entire archive ‘backup .cfg file.pl was executed atter each reboot? A .tar.bz2’ Which of the following commands will accomplish this? A .Place the command in the /etc/sysconfig/startup.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A Linux administrator has decided to remove a software package called exim.Place the command in the /etc/rc.rpm --uninstall exim Answer: C Question: 700 A customer requires that the following packages be installed on a server quota raidtools Samba Amanda yp-serv For which of the following purposes is this server MOST likely to be used? A .tar.tar xjf backup.There are too many users.tar xZa backup.boot file. Answer: A Question: 702 How would an administrator ensure that the command /usr/local/radius/startrad.File server C .

243 Answer: D Question: 706 An administrator is seeking to view the information contained in the wtmp log file.0 netmask 255. Which of the following commands can be used? A .0 Flags UG U UG Metric 0 0 0 Ref 0 0 0 Use 0 0 0 Iface eth0 eth eth0 Which of the following is a valid method for removing the route? A .0.3.1.1.0.route del -net 192.route remove -net 192.1 Genmask 255.168.0 Gateway 192.168.1.3.1 D .displaytmp Answer: A Question: 707 A user wants to set up a parallel port printer on the workstation’s second parallel port.255.255.0 192. Which of the following commands is designed to display the contents of this file in human-readable format? A .0 255./dev/epp2 C .bz2 Answer: A Question: 704 A Linux user wants to create a hard link named ile2 in the current directory that points to /usr/var/file.168.showtmp D .Last B .tar xbf backup.0 gw 192.route remove 192.wshow C .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 C .0 192.0.1.tar.0 netmask 255.168.0.255. Which of the following device identifiers needs to be used during configuration? A .3./dev/ecpl Answer: A Page 210 of 217 .168.0 0.255.255.0.166.168.tar.0./dev/prn2 D .tar x--bz2 backup.255.In /usr/var/file file2 C .edit /proc/net/netstat B .0 255.243 0.1.In -h /usr/var/file file2 Answer: B Question: 705 The administrator has added a specific route for 192.3.168.0 gw 192.255.0/24 to the routing table as shown below: Destination 192.168.255.0 0 0.255.0 C .In file2 /usr/var/file B .255./dev/lpl B .3.168.bz2 D .In -h file2 /usr/var/file D .

Reduce MOG_LEVEL=6 in /etc/syslog. Which of the following is the BEST way to minimize the down time? A . Answer: D Question: 711 A new RPM package returns a large number of errors and has never run successfully.text Answer: C Question: 710 The DNS administrator needs to change the IP address of the primary Webserver. Which of the following is a quick and easy way to do this? A .text B .rpm -q -a sort> rpmlist.rpm -qa %-1 .Pipe the output to the cat command D .rpm -q --dump rpmlist.ulimit -t 90 C. D .Change the Webserver TTL (Time-To-Live) record to 5 minutes. B .echo 90 >/proc/me/limits/time Answer: B Question: 709 The system administrator wants to create a list of all of the RPM packages installed on a server in alphabetical order.conf on the Webserver.diff --rpm <package_name> <installation_file> Answer: B Question: 712 A new shell command generates too much output to read on the screen and does not write to a log file.rpm -V <package_name> C . Any down time would have a major impact.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 708 Which of the following BASH shell built-in commands can be used to apply a CPU time limit of 90 seconds on the current shell session? A .conf to a lower number C .text D .verify <package_name> B .Use on the command line Answer: D Page 211 of 217 . C .Change the Webserver PTR record to the new hostname.Notify the domain registrar of the change in advance.setlimit-t90 D .Update /etc/resolv.rpmdb --dump rpmlist.text C .Run the command as a daemon B .[A-Z]% > rpmlist. Which of the following would capture the output for evaluation? A . Which of the following commands should be run as a FIRST step to troubleshooting this problem? A .limits -t 90 B .rpmdb -v <installation_file> D .

Error Unexpected input “$“ Answer: C Question: 717 The named service needs to be secured.GREEN D .new Answer: C Question: 715 The system administrator suspects the machine has been compromised and would like to search the system for any setuid programs.new”? A . Which of the following would BEST accomplish this? Page 212 of 217 . and grep has returned an error.mvhelp.mkfs -t ext3 -j /dev/hda2 D .help.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Question: 713 Which of the following commands could be used to convert the ext2 file system on /dev/hda2 to use the ext3 file system? A .rpm-Va B .e2image -j /dev/hda2 C .find/ -perm -4000 Answer: D Question: 716 A script set to run using /bin/sh has executed a grep command.new B .End B .new .locate --suid D .cp help.new D .tune2fs-j /dev/hda2 B .new . Which of the following commands would accomplish this? A .e2label -t ext3 /dev/hda2 Answer: A Question: 714 Which of the following commands can be used to hide the file “help.help.BLUE C .chmod 4000 help.atrrib -h help. If the grep result is analyzed by the following logic: if [ “$?“ = 0 ] then echo BLUE else echo GREEN fi Which of the following will be the scripts output? A .search u+s C .new C .

168.128.The netmask is wrong and should be changed to 255 .168.copy B . Which of the following ifconfig commands will do this correctly? A . D .4.xcopy C .255.168.ifconfig eth0 unicast C . the administrator discovers the machine does not have a bootable CD-ROM drive.Change the root login name. Answer: B Question: 718 A technician wants to allow the computer to sniff incoming and outgoing packets on the Ethernet interface.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A . Which of the following DOS utilities would the administrator use to write a diskette image onto a 3.5.255 .The Ethernet card is faulty. D .The Ethernet cable is faulty.255.5” diskette? A . D .Change the root directory for the shell.ifconfig eth0 listenall Answer: A Question: 719 A Linux workstation that has been configured with the IP address of 192.235/26 and a default gateway of 192. C . C . Which of the following is the problem? A . The workstation cannot ping a second server at 192.1. C .linload D .Change the root application. The administrator has verified that the default gateway setting is correct.Run named on a non-standard port.255. B . It can ping a server at 192.The netmask is wrong and should be changed to 255.168.Run named in a chroot jail. Answer: C Question: 720 After downloading a new Linux distribution for a new installation.3.ifconfig eth0 multicast D .rawwrite Answer: D Question: 721 Which of the following is the function of the chroot command? A .0. B .Run named in UDP mode only.4.250.Change the root password.4. B .ifconfig eth0 promisc B .Run named as root. Answer: D Question: 722 Page 213 of 217 .

agetty C .lilo.Add an entry to the options list in /etc/fstab D .Add an entry to /etc/setuid.console Answer: B Question: 723 After the LILO configuration file is edited. How would this be accomplished? A ./local Answer: C Question: 726 A Linux administrator wants to disable the use of setuid and setgid files for the /var file system.find /etc/ntp D .Add an entry to the options list in /etc/sysctl.lilo B ./usr B .sshd B ./home D .conf Answer: C Question: 727 Page 214 of 217 . which of the following directories would MOST likely be on a separate partition? A .conf D .find ntp* C .conf B .Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 Which of the following programs could be used to display a remote login prompt on a serial line or terminal? A ./var C .fdisk-mbr Answer: A Question: 724 Which of the following commands can be used to find all instances of files in the /etc directory containing tp in the file name? A .portmap D . which of the following needs to be done to implement the changes? A .find /etcr/* ntp* Answer: D Question: 725 When a file server is installed.loadlin C .Run the command “tune2fs --nosuid /var” C .find *ntp B .

/etc/named. Which of the following files must be checked to confirm DNS settings? A . Answer: C Question: 731 Which of the following modules is a dependency module for PCMCIA card services? A .anonymous = yes Answer: C Question: 730 A user who is installing Linux inserts the install CD-ROM and then reboots the computer. B . C . However.printall = yes C .ReiserFS Answer: B Question: 729 The following is part of the Samba configuration file: [aprinter] path = /usr/spool/public read only = yes printable = yes Which of the following lines needs to be added to the file to allow print access to everyone? A ./etc/nameserver.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 A workstation is unable to browse a Website by name./etc/init.jfs B .guestok = yes D . After reboot.The hard drive does not support Linux. D .conf D .The user needs to install a Windows driver.users = * B .conf C .The computer BIOS has the wrong boot order.d B .ext3 D .conf Answer: B Question: 728 A Linux system is powered down unexpectedly. an automatic disk check is run and numerous mode errors are reported and corrected. Which of the following MOST likely caused the problem? A . the computer boots into Windows./etc/resolv.hid Page 215 of 217 .ext2 C . Which of the following file systems was MOST likely used? A .The MD5 sum is erroneous.

None of the above. DAC D. Answer: A Question: 735 Which of the following commands will mount a USB flash drive successfully in Linux? A. B. nobody D. root C. the computer reported that there are problems with inodes and blocks. B.parport_pc D . Predefined access privileges. the computer reported that there are problems with inodes and blocks. ntadmin Answer: B Question: 733 Which of the following access control models uses roles to determine access permissions? A. Which of the following is the problem and how is it corrected?roblem and how is it corrected? A. RBAC C. C. The boot sector is corrupt and needs to be replaced. Page 216 of 217 . The file system has become corrupt and needs to be repaired. adm B. Which of the following is the pAt boot time.yenta_socket Answer: D Question: 732 Which of the following group-level permissions is needed to create user accounts? A. mount /dev/uda1 /mnt/usb D. mount /dev/hde1 /mnt/usb Answer: A Question: 736 At boot time. None of the above.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 B . RBAC D. DAC C.tulip C . Answer: C Question: 734 Which access control model uses predefined access privileges control access to a resource? A. The partition table has become corrupt and needs to be repaired. MAC B. MAC B. mount -t usbfs /dev/usb001 /mnt/usb C.

Answer: A.Exam Name: Exam Type: Exam Code: Linux+ CompTIA XK0-002 Total Questions: 736 D. The drive is configured using an improper file system and needs to be reformatted. B End of Document Page 217 of 217 .

Sign up to vote on this title
UsefulNot useful

Master Your Semester with Scribd & The New York Times

Special offer: Get 4 months of Scribd and The New York Times for just $1.87 per week!

Master Your Semester with a Special Offer from Scribd & The New York Times